000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:25 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:27 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d2")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:27 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d2")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:28 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d2")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1034.655054][T19762] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1034.672205][T19762] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1034.680503][T19762] device bridge_slave_0 entered promiscuous mode
[ 1035.529899][T19762] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1035.552214][T19762] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1035.560777][T19762] device bridge_slave_1 entered promiscuous mode
21:23:29 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:30 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:31 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1038.179801][T19762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 1038.215982][T19762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
21:23:32 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:33 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1039.498766][T19762] team0: Port device team_slave_0 added
21:23:33 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1040.072414][ T3310] Bluetooth: hci2: command 0x0409 tx timeout
21:23:35 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:35 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1041.875610][T19762] team0: Port device team_slave_1 added
[ 1042.142386][ T3558] Bluetooth: hci2: command 0x041b tx timeout
21:23:36 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:37 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:37 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1044.222395][T18439] Bluetooth: hci2: command 0x040f tx timeout
[ 1044.382530][T18436] Bluetooth: hci3: command 0x0409 tx timeout
[ 1044.406352][T19762] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 1044.418642][T19762] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 1044.467934][T19762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
21:23:38 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1044.777955][T19762] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 1044.796401][T19762] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 1044.842219][T19762] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 1045.197405][ T154] device hsr_slave_0 left promiscuous mode
[ 1045.459787][ T154] device hsr_slave_1 left promiscuous mode
[ 1045.581063][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 1045.602340][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1045.636697][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 1045.654725][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
21:23:39 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1045.724501][ T154] device bridge_slave_1 left promiscuous mode
[ 1045.730713][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1046.156245][ T154] device bridge_slave_0 left promiscuous mode
[ 1046.172283][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1046.304263][T16079] Bluetooth: hci2: command 0x0419 tx timeout
[ 1046.462211][T16079] Bluetooth: hci3: command 0x041b tx timeout
[ 1046.577665][ T154] device hsr_slave_0 left promiscuous mode
21:23:40 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1046.832280][ T154] device hsr_slave_1 left promiscuous mode
21:23:41 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1047.256478][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1047.584830][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1047.761086][ T154] device bridge_slave_1 left promiscuous mode
[ 1047.767516][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
21:23:41 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1048.042458][ T154] device bridge_slave_0 left promiscuous mode
[ 1048.048672][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1048.245149][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1048.269510][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1048.284464][ T154] device bridge_slave_1 left promiscuous mode
[ 1048.290795][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1048.552294][T16080] Bluetooth: hci3: command 0x040f tx timeout
[ 1048.616322][ T154] device bridge_slave_0 left promiscuous mode
[ 1048.627960][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:42 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1049.172325][ T154] device hsr_slave_0 left promiscuous mode
21:23:43 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1049.632317][ T154] device hsr_slave_1 left promiscuous mode
[ 1049.869151][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
21:23:43 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(0x0, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1049.974157][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1050.074366][ T154] device bridge_slave_1 left promiscuous mode
[ 1050.080705][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
21:23:44 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(0x0, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1050.502649][ T154] device bridge_slave_0 left promiscuous mode
[ 1050.508858][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1050.632289][T16079] Bluetooth: hci3: command 0x0419 tx timeout
[ 1050.654823][ T154] device hsr_slave_0 left promiscuous mode
[ 1050.668093][ T154] device hsr_slave_1 left promiscuous mode
[ 1050.795921][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
21:23:44 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(0x0, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1050.846257][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1051.114337][ T154] device bridge_slave_1 left promiscuous mode
[ 1051.120575][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1051.493317][ T154] device bridge_slave_0 left promiscuous mode
[ 1051.499539][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:45 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:46 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1052.442339][ T154] device hsr_slave_0 left promiscuous mode
21:23:46 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1052.736685][ T154] device hsr_slave_1 left promiscuous mode
[ 1053.014107][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 1053.021659][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
21:23:47 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1053.241386][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 1053.255923][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1053.296602][ T154] device bridge_slave_1 left promiscuous mode
[ 1053.309193][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1053.952600][ T154] device bridge_slave_0 left promiscuous mode
[ 1053.958831][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1054.018755][ T154] device hsr_slave_0 left promiscuous mode
[ 1054.032784][ T154] device hsr_slave_1 left promiscuous mode
[ 1054.042714][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 1054.050183][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1054.108316][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 1054.122260][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
21:23:48 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1054.401479][ T1374] ieee802154 phy0 wpan0: encryption failed: -22
[ 1054.407816][ T1374] ieee802154 phy1 wpan1: encryption failed: -22
[ 1054.711113][ T154] device bridge_slave_1 left promiscuous mode
[ 1054.722281][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1055.145549][ T154] device bridge_slave_0 left promiscuous mode
[ 1055.151773][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:49 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:50 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x0, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1056.254594][ T154] device hsr_slave_0 left promiscuous mode
[ 1056.582245][ T154] device hsr_slave_1 left promiscuous mode
[ 1056.698749][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1056.761073][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
21:23:50 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x0, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1056.824612][ T154] device bridge_slave_1 left promiscuous mode
[ 1056.830801][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1057.156351][ T154] device bridge_slave_0 left promiscuous mode
[ 1057.166061][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:51 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x0, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1057.922470][ T154] device hsr_slave_0 left promiscuous mode
[ 1057.932556][ T154] device hsr_slave_1 left promiscuous mode
[ 1057.944216][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1057.965377][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1058.191043][ T154] device bridge_slave_1 left promiscuous mode
[ 1058.212855][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
21:23:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x0, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1058.326714][ T154] device bridge_slave_0 left promiscuous mode
[ 1058.342183][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1058.363255][ T154] device hsr_slave_0 left promiscuous mode
[ 1058.369639][ T154] device hsr_slave_1 left promiscuous mode
[ 1058.382688][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1058.403259][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1058.586004][ T154] device bridge_slave_1 left promiscuous mode
[ 1058.592333][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
21:23:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x0, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:23:53 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x0, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1059.124595][ T154] device bridge_slave_0 left promiscuous mode
[ 1059.130814][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:53 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x0, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1059.941590][ T154] device hsr_slave_0 left promiscuous mode
[ 1060.524433][ T154] device hsr_slave_1 left promiscuous mode
[ 1061.053168][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1061.264554][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1061.486528][ T154] device bridge_slave_1 left promiscuous mode
[ 1061.499472][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1061.660899][ T154] device bridge_slave_0 left promiscuous mode
[ 1061.671749][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:55 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x0, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1062.013988][ T154] device hsr_slave_0 left promiscuous mode
[ 1062.110263][ T154] device hsr_slave_1 left promiscuous mode
[ 1062.230260][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1062.254468][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1062.359157][ T154] device bridge_slave_1 left promiscuous mode
[ 1062.365403][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
21:23:56 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x0, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1062.696141][ T154] device bridge_slave_0 left promiscuous mode
[ 1062.712309][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1063.400473][ T154] device hsr_slave_0 left promiscuous mode
[ 1063.410564][ T154] device hsr_slave_1 left promiscuous mode
21:23:57 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x0, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1063.453000][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 1063.460520][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 1063.486787][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 1063.502929][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 1063.512954][ T154] device bridge_slave_1 left promiscuous mode
[ 1063.519485][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1064.065184][ T154] device bridge_slave_0 left promiscuous mode
[ 1064.071408][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
21:23:58 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x0, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1065.453107][ T154] device veth1_macvtap left promiscuous mode
[ 1065.459283][ T154] device veth0_macvtap left promiscuous mode
[ 1065.491324][ T154] device veth1_vlan left promiscuous mode
[ 1065.497357][ T154] device veth0_vlan left promiscuous mode
21:23:59 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x0, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:00 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:01 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1067.443095][ T154] device veth1_macvtap left promiscuous mode
[ 1067.449157][ T154] device veth0_macvtap left promiscuous mode
[ 1067.474068][ T154] device veth1_vlan left promiscuous mode
[ 1067.479878][ T154] device veth0_vlan left promiscuous mode
21:24:02 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1068.695577][ T154] device veth1_macvtap left promiscuous mode
[ 1068.702993][ T154] device veth0_macvtap left promiscuous mode
[ 1068.709066][ T154] device veth1_vlan left promiscuous mode
[ 1068.729761][ T154] device veth0_vlan left promiscuous mode
[ 1069.047394][ T154] device veth0_vlan left promiscuous mode
[ 1069.058104][ T154] device veth1_macvtap left promiscuous mode
[ 1069.071641][ T154] device veth0_macvtap left promiscuous mode
[ 1069.092630][ T154] device veth1_vlan left promiscuous mode
[ 1069.099220][ T154] device veth0_vlan left promiscuous mode
21:24:03 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:04 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:04 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:05 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:05 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:06 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:06 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:09 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:10 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:11 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:11 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:12 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:12 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:13 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:14 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:14 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1081.022168][T16079] Bluetooth: hci5: command 0x0409 tx timeout
21:24:15 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:16 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:16 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1083.102360][T18439] Bluetooth: hci5: command 0x041b tx timeout
21:24:17 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:18 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:19 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1085.182188][T14037] Bluetooth: hci5: command 0x040f tx timeout
21:24:19 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:20 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:21 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1087.262365][T14036] Bluetooth: hci5: command 0x0419 tx timeout
21:24:21 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1087.742273][T14037] Bluetooth: hci6: command 0x0409 tx timeout
21:24:22 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1089.822435][T14036] Bluetooth: hci6: command 0x041b tx timeout
21:24:24 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:24 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:25 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:25 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1091.902385][T14037] Bluetooth: hci6: command 0x040f tx timeout
21:24:26 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1093.982292][ T3554] Bluetooth: hci6: command 0x0419 tx timeout
21:24:28 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:29 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:30 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:30 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1097.604512][ T154] team0 (unregistering): Port device team_slave_1 removed
21:24:31 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1098.310969][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1098.655007][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:24:32 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:33 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1099.405570][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:24:33 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:34 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:35 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1102.112969][ T154] bond0 (unregistering): Released all slaves
21:24:36 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:37 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:38 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:39 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:40 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1106.142524][T14037] Bluetooth: hci7: command 0x0409 tx timeout
21:24:40 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:41 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:42 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1108.232171][T16080] Bluetooth: hci7: command 0x041b tx timeout
21:24:43 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1109.651039][ T154] team0 (unregistering): Port device team_slave_1 removed
21:24:43 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1110.307049][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1110.312516][ T3310] Bluetooth: hci7: command 0x040f tx timeout
[ 1110.462265][T18439] Bluetooth: hci8: command 0x0409 tx timeout
21:24:44 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1110.932812][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:24:45 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1111.185628][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 1111.562656][ T154] bond0 (unregistering): Released all slaves
[ 1111.683620][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1111.708967][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1111.771231][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 1111.829733][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:24:45 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:46 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1112.382388][ T3562] Bluetooth: hci7: command 0x0419 tx timeout
[ 1112.552466][ T3562] Bluetooth: hci8: command 0x041b tx timeout
21:24:47 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1114.442967][ T154] bond0 (unregistering): Released all slaves
[ 1114.632054][T16080] Bluetooth: hci8: command 0x040f tx timeout
21:24:48 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1115.074805][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1115.614063][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1115.842472][ T1374] ieee802154 phy0 wpan0: encryption failed: -22
[ 1115.848787][ T1374] ieee802154 phy1 wpan1: encryption failed: -22
21:24:50 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1116.742066][T16080] Bluetooth: hci8: command 0x0419 tx timeout
[ 1116.943581][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:24:51 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1117.572777][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:24:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x0, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x0, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x0, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:53 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x0, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1120.492524][ T154] bond0 (unregistering): Released all slaves
21:24:54 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x0, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:55 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x0, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:55 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0x0, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:56 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0x0, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:57 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0x0, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:24:58 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x0, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1125.037479][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1125.361337][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1125.709193][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 1126.083395][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:25:00 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x0, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:01 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x0, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1129.059214][ T154] bond0 (unregistering): Released all slaves
21:25:03 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x0, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:04 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x0, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:05 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x0, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:06 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:06 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1132.973948][ T154] team0 (unregistering): Port device team_slave_1 removed
21:25:07 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1133.619190][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1134.255580][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:25:08 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x0, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1134.832569][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:25:08 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x0, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:09 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x0, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:10 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1136.920477][ T154] bond0 (unregistering): Released all slaves
21:25:11 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:12 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1138.392191][ T3562] Bluetooth: hci0: command 0x0406 tx timeout
21:25:12 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:13 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:14 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:15 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:15 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1142.229180][ T154] team0 (unregistering): Port device team_slave_1 removed
21:25:16 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1142.572880][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1142.977507][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:25:17 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1143.322729][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:25:17 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1143.502506][ T3310] Bluetooth: hci4: command 0x0406 tx timeout
21:25:19 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:19 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(0x0, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:19 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(0x0, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1146.715781][ T154] bond0 (unregistering): Released all slaves
21:25:20 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(0x0, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1147.182673][T14036] Bluetooth: hci9: command 0x0409 tx timeout
21:25:21 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:22 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:23 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1149.262684][ T3554] Bluetooth: hci9: command 0x041b tx timeout
21:25:23 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x0, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:24 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x0, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1151.342396][T14036] Bluetooth: hci9: command 0x040f tx timeout
21:25:25 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x0, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1151.854440][ T154] team0 (unregistering): Port device team_slave_1 removed
21:25:26 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x0, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1152.955447][ T154] team0 (unregistering): Port device team_slave_0 removed
21:25:27 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x0, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1153.342632][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 1153.422860][ T3554] Bluetooth: hci9: command 0x0419 tx timeout
21:25:27 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x0, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1153.762456][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 1153.822332][ T3554] Bluetooth: hci10: command 0x0409 tx timeout
21:25:28 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x0, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1155.051321][ T154] bond0 (unregistering): Released all slaves
21:25:29 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x0, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:29 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x0, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1155.902334][ T3554] Bluetooth: hci10: command 0x041b tx timeout
21:25:31 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x0, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1157.982267][T14036] Bluetooth: hci10: command 0x040f tx timeout
21:25:32 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x0, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1158.282397][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1158.688113][ T154] team0 (unregistering): Port device team_slave_0 removed
21:25:32 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x0, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1159.193699][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 1159.215238][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:25:33 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:33 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1160.062220][T14036] Bluetooth: hci10: command 0x0419 tx timeout
21:25:34 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1161.072921][ T154] bond0 (unregistering): Released all slaves
21:25:35 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:36 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1163.982472][T14036] Bluetooth: hci2: command 0x0406 tx timeout
21:25:38 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1165.224181][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1165.531349][ T154] team0 (unregistering): Port device team_slave_0 removed
21:25:39 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1166.270122][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:25:40 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1166.750731][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:25:41 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:42 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:42 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1169.102218][T14037] Bluetooth: hci3: command 0x0406 tx timeout
21:25:43 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1169.350890][ T154] bond0 (unregistering): Released all slaves
21:25:44 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:44 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:45 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:46 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1172.143275][T14037] Bluetooth: hci11: command 0x0409 tx timeout
21:25:46 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:46 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:47 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1174.222398][ T3554] Bluetooth: hci11: command 0x041b tx timeout
[ 1174.286368][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1174.321295][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1174.347002][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 1174.376317][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 1174.944104][ T154] bond0 (unregistering): Released all slaves
21:25:48 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:49 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1176.302681][T18439] Bluetooth: hci11: command 0x040f tx timeout
21:25:50 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1176.862452][T16080] Bluetooth: hci12: command 0x0409 tx timeout
[ 1177.272388][ T1374] ieee802154 phy0 wpan0: encryption failed: -22
[ 1177.278717][ T1374] ieee802154 phy1 wpan1: encryption failed: -22
21:25:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1178.382527][ T3554] Bluetooth: hci11: command 0x0419 tx timeout
21:25:52 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1178.942519][ T3554] Bluetooth: hci12: command 0x041b tx timeout
21:25:53 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1179.879648][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1180.412832][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1180.607656][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
21:25:54 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1181.009828][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 1181.022675][ T3554] Bluetooth: hci12: command 0x040f tx timeout
21:25:55 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:55 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1182.391987][ T154] bond0 (unregistering): Released all slaves
21:25:56 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:57 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1183.102504][T18439] Bluetooth: hci12: command 0x0419 tx timeout
21:25:57 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:58 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:25:59 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:26:00 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1186.586832][ T154] team0 (unregistering): Port device team_slave_1 removed
[ 1187.228337][ T154] team0 (unregistering): Port device team_slave_0 removed
[ 1187.328735][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 1187.588946][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
21:26:01 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:26:03 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1190.161034][ T154] bond0 (unregistering): Released all slaves
21:26:04 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:26:05 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:26:06 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
21:26:07 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1193.902701][ T27] INFO: task kworker/1:11:15604 blocked for more than 143 seconds.
[ 1193.919331][ T27] Not tainted 5.15.151-syzkaller #0
[ 1193.925823][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1193.952170][ T27] task:kworker/1:11 state:D stack:24992 pid:15604 ppid: 2 flags:0x00004000
[ 1193.961404][ T27] Workqueue: events nsim_dev_trap_report_work
[ 1193.982517][ T27] Call Trace:
[ 1193.985816][ T27]
[ 1193.988755][ T27] __schedule+0x12c4/0x45b0
[ 1194.002135][ T27] ? mark_lock+0x98/0x340
[ 1194.006542][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 1194.032247][ T27] ? __sched_text_start+0x8/0x8
[ 1194.037118][ T27] ? __mutex_trylock_common+0x8d/0x2e0
[ 1194.052050][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 1194.057276][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 1194.072046][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 1194.092205][ T27] schedule+0x11b/0x1f0
[ 1194.096386][ T27] schedule_preempt_disabled+0xf/0x20
[ 1194.101769][ T27] __mutex_lock_common+0xe34/0x25a0
[ 1194.115160][ T27] ? nsim_dev_trap_report_work+0x56/0xab0
[ 1194.120907][ T27] ? mutex_lock_io_nested+0x60/0x60
[ 1194.126192][ T27] mutex_lock_nested+0x17/0x20
[ 1194.130959][ T27] nsim_dev_trap_report_work+0x56/0xab0
[ 1194.149948][ T27] ? print_irqtrace_events+0x210/0x210
[ 1194.162045][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 1194.167966][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 1194.182058][ T27] process_one_work+0x8a1/0x10c0
[ 1194.187085][ T27] ? worker_detach_from_pool+0x260/0x260
[ 1194.202063][ T27] ? _raw_spin_lock_irqsave+0x120/0x120
[ 1194.207626][ T27] ? kthread_data+0x4e/0xc0
[ 1194.212563][ T27] ? wq_worker_running+0x97/0x170
[ 1194.217599][ T27] worker_thread+0xaca/0x1280
[ 1194.232051][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 1194.241519][ T27] kthread+0x3f6/0x4f0
[ 1194.246432][ T27] ? rcu_lock_release+0x20/0x20
21:26:08 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1194.251297][ T27] ? kthread_blkcg+0xd0/0xd0
[ 1194.262061][ T27] ret_from_fork+0x1f/0x30
[ 1194.266524][ T27]
[ 1194.269589][ T27]
[ 1194.269589][ T27] Showing all locks held in the system:
[ 1194.293934][ T27] 2 locks held by kworker/0:0/7:
[ 1194.298883][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 1194.309868][ T27] #1: ffffc90000cc7d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 1194.332164][ T27] 1 lock held by khungtaskd/27:
[ 1194.337045][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30
[ 1194.346763][ T27] 4 locks held by kworker/u4:2/154:
[ 1194.351966][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 1194.362789][ T27] #1: ffffc900010cfd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 1194.380335][ T27] #2: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60
[ 1194.390431][ T27] #3: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40
[ 1194.402095][ T27] 2 locks held by getty/3255:
[ 1194.406807][ T27] #0: ffff888024466098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70
[ 1194.422046][ T27] #1: ffffc9000229c2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0
[ 1194.442063][ T27] 3 locks held by kworker/0:3/3310:
[ 1194.447302][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 1194.458063][ T27] #1: ffffc900012dfd20 ((work_completion)(&pwq->unbound_release_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 1194.470869][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740
[ 1194.483924][ T27] 2 locks held by kworker/u4:5/3582:
[ 1194.489761][ T27] 3 locks held by kworker/1:11/15604:
[ 1194.502058][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 1194.512837][ T27] #1: ffffc90003257d20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 1194.532043][ T27] #2: ffff888018673400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0
[ 1194.552063][ T27] 7 locks held by syz-executor.0/19727:
[ 1194.557613][ T27] #0: ffff8880247b0460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50
[ 1194.584238][ T27] #1: ffff88805fc49088 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0
[ 1194.594700][ T27] #2: ffff888147de7e88 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0
[ 1194.612046][ T27] #3: ffffffff8d357ac8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470
[ 1194.616841][T22082] chnl_net:caif_netlink_parms(): no params data found
[ 1194.642042][ T27] #4: ffff8880795b8178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0
[ 1194.662308][ T27] #5: ffff888018673400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240
[ 1194.673918][ T27] #6:
[ 1194.678462][T22028] chnl_net:caif_netlink_parms(): no params data found
[ 1194.678530][ T27] ffff8880b9a27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810
[ 1194.693323][T22446] chnl_net:caif_netlink_parms(): no params data found
[ 1194.699281][ T27] 4 locks held by syz-executor.3/19762:
[ 1194.713962][ T27] #0: ffff888077ef4ff0 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0x63/0x1070
[ 1194.723872][ T27] #1: ffff888077ef4078 (&hdev->lock){+.+.}-{3:3}, at: hci_dev_do_close+0x431/0x1070
[ 1194.733432][ T27] #2: ffffffff8db24868 (hci_cb_list_lock){+.+.}-{3:3}, at: hci_conn_hash_flush+0xb8/0x220
[ 1194.745326][ T27] #3: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740
[ 1194.756303][ T27] 3 locks held by syz-executor.2/20142:
[ 1194.761840][ T27] #0: ffff88803e16cff0 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0x63/0x1070
[ 1194.771668][ T27] #1: ffff88803e16c078 (&hdev->lock){+.+.}-{3:3}, at: hci_dev_do_close+0x431/0x1070
[ 1194.781282][ T27] #2: ffffffff8db24868 (hci_cb_list_lock){+.+.}-{3:3}, at: hci_conn_hash_flush+0xb8/0x220
[ 1194.791910][ T27] 2 locks held by syz-executor.1/20265:
[ 1194.797504][ T27] #0: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x37b/0x5d0
[ 1194.807061][ T27] #1: ffffffff8c923bf0 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x9c/0x4e0
[ 1194.817038][ T27] 1 lock held by syz-executor.0/22028:
[ 1194.826092][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 1194.835706][ T27] 1 lock held by syz-executor.3/22082:
[ 1194.841157][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 1194.850644][ T27] 1 lock held by syz-executor.2/22413:
[ 1194.858016][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 1194.867826][ T27] 2 locks held by syz-executor.4/22419:
[ 1194.873444][ T27] 3 locks held by syz-executor.4/22423:
[ 1194.879016][ T27] 2 locks held by syz-executor.4/22426:
[ 1194.884848][ T27] 2 locks held by syz-executor.4/22430:
[ 1194.890393][ T27] 2 locks held by syz-executor.4/22434:
[ 1194.896560][ T27] 2 locks held by syz-executor.4/22442:
[ 1194.902339][ T27] 1 lock held by syz-executor.1/22446:
[ 1194.907800][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 1194.918117][ T27] 2 locks held by syz-executor.4/22452:
[ 1194.924060][ T27] 2 locks held by syz-executor.4/22455:
[ 1194.929609][ T27] 2 locks held by syz-executor.4/22460:
[ 1194.941345][ T27] 2 locks held by syz-executor.4/22465:
[ 1194.954854][ T27] 3 locks held by syz-executor.4/22468:
[ 1194.960401][ T27] 2 locks held by syz-executor.4/22471:
[ 1194.969385][ T27] 2 locks held by syz-executor.4/22550:
[ 1194.982047][ T27] 3 locks held by syz-executor.4/22554:
[ 1194.987595][ T27] 2 locks held by syz-executor.4/22558:
[ 1194.993537][ T27] 2 locks held by syz-executor.4/22562:
[ 1194.999381][ T27] 3 locks held by syz-executor.4/22565:
[ 1195.012071][ T27] 2 locks held by syz-executor.4/22569:
[ 1195.017667][ T27] 2 locks held by syz-executor.4/22677:
[ 1195.023845][ T27] 2 locks held by syz-executor.4/22680:
[ 1195.029393][ T27] 3 locks held by syz-executor.4/22764:
[ 1195.035277][ T27] 3 locks held by syz-executor.4/22772:
[ 1195.040818][ T27] 3 locks held by syz-executor.4/22793:
[ 1195.052048][ T27]
[ 1195.054408][ T27] =============================================
[ 1195.054408][ T27]
[ 1195.073317][ T27] NMI backtrace for cpu 0
[ 1195.077657][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0
[ 1195.085644][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
[ 1195.095703][ T27] Call Trace:
[ 1195.098976][ T27]
[ 1195.101905][ T27] dump_stack_lvl+0x1e3/0x2cb
[ 1195.106615][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 1195.112246][ T27] ? panic+0x84d/0x84d
[ 1195.116317][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0
[ 1195.121527][ T27] nmi_cpu_backtrace+0x46a/0x4a0
[ 1195.126466][ T27] ? __wake_up_klogd+0xd5/0x100
[ 1195.131339][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0
[ 1195.137494][ T27] ? _printk+0xd1/0x111
[ 1195.141647][ T27] ? panic+0x84d/0x84d
[ 1195.145729][ T27] ? __wake_up_klogd+0xcc/0x100
[ 1195.150585][ T27] ? panic+0x84d/0x84d
[ 1195.154659][ T27] ? __rcu_read_unlock+0x92/0x100
[ 1195.159695][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10
[ 1195.165822][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0
[ 1195.171804][ T27] watchdog+0xe72/0xeb0
[ 1195.176024][ T27] kthread+0x3f6/0x4f0
[ 1195.180095][ T27] ? hungtask_pm_notify+0x50/0x50
[ 1195.185129][ T27] ? kthread_blkcg+0xd0/0xd0
[ 1195.189724][ T27] ret_from_fork+0x1f/0x30
[ 1195.194150][ T27]
[ 1195.197744][ T27] Sending NMI from CPU 0 to CPUs 1:
[ 1195.203199][ C1] NMI backtrace for cpu 1
[ 1195.203209][ C1] CPU: 1 PID: 2943 Comm: syslogd Not tainted 5.15.151-syzkaller #0
[ 1195.203226][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
[ 1195.203234][ C1] RIP: 0010:__rcu_read_unlock+0x65/0x100
[ 1195.203254][ C1] Code: b6 04 23 84 c0 75 69 41 89 6d 00 85 ed 75 1d 4d 8d be 40 04 00 00 4c 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 75 78 41 83 3f 00 <75> 23 42 0f b6 04 23 84 c0 75 52 41 8b 45 00 3d 00 00 00 40 73 0b
[ 1195.203266][ C1] RSP: 0018:ffffc9000d157a48 EFLAGS: 00000246
[ 1195.203280][ C1] RAX: 0000000000000000 RBX: 1ffff1100486dbaf RCX: ffff88802436d940
[ 1195.203292][ C1] RDX: 0000000000000000 RSI: ffffffff8ad88f20 RDI: ffffffff8ad88ee0
[ 1195.203303][ C1] RBP: 0000000000000000 R08: ffffffff83cb20b1 R09: fffffbfff1f79e19
[ 1195.203314][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[ 1195.203324][ C1] R13: ffff88802436dd7c R14: ffff88802436d940 R15: ffff88802436dd80
[ 1195.203336][ C1] FS: 00007f7a288e8380(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
[ 1195.203350][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1195.203361][ C1] CR2: 00007f4ebab676e4 CR3: 0000000022e64000 CR4: 00000000003506e0
[ 1195.203375][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1195.203384][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 1195.203394][ C1] Call Trace:
[ 1195.203398][ C1]
[ 1195.203403][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0
[ 1195.203421][ C1] ? read_lock_is_recursive+0x10/0x10
[ 1195.203437][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0
[ 1195.203453][ C1] ? unknown_nmi_error+0xd0/0xd0
[ 1195.203543][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10
[ 1195.203557][ C1] ? nmi_handle+0xf7/0x370
[ 1195.203572][ C1] ? __rcu_read_unlock+0x65/0x100
[ 1195.203586][ C1] ? default_do_nmi+0x62/0x150
[ 1195.203601][ C1] ? exc_nmi+0xab/0x120
[ 1195.203614][ C1] ? end_repeat_nmi+0x16/0x31
[ 1195.203657][ C1] ? aa_file_perm+0x2e1/0xf60
[ 1195.203708][ C1] ? __rcu_read_unlock+0x65/0x100
[ 1195.203722][ C1] ? __rcu_read_unlock+0x65/0x100
[ 1195.203738][ C1] ? __rcu_read_unlock+0x65/0x100
[ 1195.203752][ C1]
21:26:09 executing program 4:
ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1)
r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff)
ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0))
r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b")
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8)
r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18)
syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab")
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb)
perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20)
perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1)
[ 1195.203757][ C1]
[ 1195.203763][ C1] aa_file_perm+0x3aa/0xf60
[ 1195.203777][ C1] ? reacquire_held_locks+0x660/0x660
[ 1195.203791][ C1] ? __lock_acquire+0x1ff0/0x1ff0
[ 1195.203806][ C1] ? aa_path_link+0xea0/0xea0
[ 1195.203819][ C1] ? sock_read_iter+0x36c/0x480
[ 1195.203858][ C1] ? memcpy+0x3c/0x60
[ 1195.203891][ C1] ? sock_read_iter+0x36c/0x480
[ 1195.203908][ C1] ? mark_lock+0x98/0x340
[ 1195.203922][ C1] common_file_perm+0x173/0x1d0
[ 1195.203938][ C1] security_file_permission+0x65/0xa0
[ 1195.203986][ C1] vfs_write+0x257/0xe50
[ 1195.204004][ C1] ? file_end_write+0x250/0x250
[ 1195.204020][ C1] ? read_lock_is_recursive+0x10/0x10
[ 1195.204034][ C1] ? __context_tracking_exit+0x4c/0x80
[ 1195.204048][ C1] ? __lock_acquire+0x1ff0/0x1ff0
[ 1195.204063][ C1] ? __fdget_pos+0x2d2/0x380
[ 1195.204095][ C1] ksys_write+0x1a2/0x2c0
[ 1195.204109][ C1] ? print_irqtrace_events+0x210/0x210
[ 1195.204124][ C1] ? __ia32_sys_read+0x80/0x80
[ 1195.204139][ C1] ? syscall_enter_from_user_mode+0x2e/0x230
[ 1195.204153][ C1] ? lockdep_hardirqs_on+0x94/0x130
[ 1195.204172][ C1] ? syscall_enter_from_user_mode+0x2e/0x230
[ 1195.204188][ C1] do_syscall_64+0x3d/0xb0
[ 1195.204204][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 1195.204219][ C1] RIP: 0033:0x7f7a28a3cbf2
[ 1195.204232][ C1] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83
[ 1195.204243][ C1] RSP: 002b:00007ffd709f10d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 1195.204258][ C1] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7a28a3cbf2
[ 1195.204269][ C1] RDX: 000000000000004f RSI: 00005641c19dfc50 RDI: 0000000000000003
[ 1195.204279][ C1] RBP: 00005641c19dfc50 R08: 0000000000000001 R09: 0000000000000000
[ 1195.204288][ C1] R10: 00007f7a28bdb3a3 R11: 0000000000000246 R12: 000000000000004f
[ 1195.204298][ C1] R13: 00007f7a288e8300 R14: 0000000000000004 R15: 00005641c19dfa60
[ 1195.204315][ C1]
[ 1195.228123][ T27] Kernel panic - not syncing: hung_task: blocked tasks
[ 1195.627100][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0
[ 1195.635079][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
[ 1195.645132][ T27] Call Trace:
[ 1195.648409][ T27]
[ 1195.651340][ T27] dump_stack_lvl+0x1e3/0x2cb
[ 1195.656032][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 1195.661671][ T27] ? panic+0x84d/0x84d
[ 1195.665756][ T27] panic+0x318/0x84d
[ 1195.669663][ T27] ? schedule_preempt_disabled+0x20/0x20
[ 1195.675297][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0
[ 1195.681457][ T27] ? fb_is_primary_device+0xcc/0xcc
[ 1195.686670][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10
[ 1195.692741][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0
[ 1195.698892][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0
[ 1195.705050][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0
[ 1195.711210][ T27] watchdog+0xeb0/0xeb0
[ 1195.715378][ T27] kthread+0x3f6/0x4f0
[ 1195.719451][ T27] ? hungtask_pm_notify+0x50/0x50
[ 1195.724476][ T27] ? kthread_blkcg+0xd0/0xd0
[ 1195.729064][ T27] ret_from_fork+0x1f/0x30
[ 1195.733487][ T27]
[ 1195.736557][ T27] Kernel Offset: disabled
[ 1195.740876][ T27] Rebooting in 86400 seconds..