dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000010000000a020000", @ANYRESOCT, @ANYRES32=0xee00], 0x30}, 0x0) 04:40:24 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000010000000a020000", @ANYRESOCT], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000010000000a020000"], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x30}, 0x0) [ 1123.810683][T13351] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1123.848085][ T102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x30}, 0x0) [ 1123.872986][ T102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 04:40:24 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:24 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000"], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c132080"], 0x30}, 0x0) 04:40:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13"], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='\\'], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) [ 1125.466954][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:40:26 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:28 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 04:40:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 04:40:28 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 04:40:29 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 04:40:29 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0x68}, 0x0) 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0x68}, 0x0) 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0x68}, 0x0) 04:40:29 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB], 0x68}, 0x0) 04:40:29 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB], 0x68}, 0x0) 04:40:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB], 0x68}, 0x0) 04:40:30 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:30 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:30 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:33 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:33 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:33 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:34 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:34 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:35 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:35 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:35 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:37 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:38 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:38 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:38 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:39 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:39 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:40 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:40 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:40 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:41 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:41 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:42 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:42 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:44 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:46 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:47 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:47 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1148.946597][ T3627] device bridge_slave_1 left promiscuous mode [ 1148.962559][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.209033][ T3627] device bridge_slave_0 left promiscuous mode [ 1149.224265][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1149.673308][T10718] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1149.681876][T10718] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1149.691207][ T9852] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1149.700154][ T9852] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1149.707648][ T9852] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1149.714951][ T9852] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 04:40:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.107605][ T9852] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1150.116616][ T9852] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1150.124822][ T9852] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1150.134106][ T9852] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1150.141551][ T9852] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1150.149512][ T9852] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 04:40:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.357152][ T3627] device hsr_slave_0 left promiscuous mode 04:40:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.399636][ T3627] device hsr_slave_1 left promiscuous mode 04:40:51 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.465157][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1150.724510][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1150.843951][ T3627] device bridge_slave_1 left promiscuous mode [ 1150.850192][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.029975][ T9852] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1151.038754][ T3627] device bridge_slave_0 left promiscuous mode [ 1151.039414][ T9852] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1151.052524][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.060112][ T9852] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1151.069772][ T9852] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1151.077408][ T9852] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1151.084738][ T9852] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 04:40:51 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.247235][ T3627] device bridge_slave_0 left promiscuous mode [ 1151.262613][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.408041][ T3627] device bridge_slave_1 left promiscuous mode [ 1151.431538][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.550572][ T3627] device bridge_slave_0 left promiscuous mode [ 1151.572861][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.732590][ T9852] Bluetooth: hci0: command 0x0409 tx timeout 04:40:52 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.790888][ T3627] device hsr_slave_0 left promiscuous mode [ 1151.801087][ T3627] device hsr_slave_1 left promiscuous mode 04:40:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.835585][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1152.043481][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1152.128887][ T3627] device bridge_slave_1 left promiscuous mode [ 1152.148339][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1152.212498][ T9852] Bluetooth: hci1: command 0x0409 tx timeout [ 1152.335477][ T3627] device bridge_slave_0 left promiscuous mode [ 1152.341727][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:53 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1152.580347][ T3627] device hsr_slave_0 left promiscuous mode [ 1152.593056][ T3627] device hsr_slave_1 left promiscuous mode [ 1152.599654][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1152.615795][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1152.636620][ T3627] device bridge_slave_1 left promiscuous mode [ 1152.655494][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1152.933228][ T3627] device bridge_slave_0 left promiscuous mode [ 1152.939495][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1153.172474][ T9852] Bluetooth: hci2: command 0x0409 tx timeout 04:40:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1153.568186][ T3627] device hsr_slave_0 left promiscuous mode 04:40:54 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1153.791985][ T3627] device hsr_slave_1 left promiscuous mode [ 1153.812525][ T9852] Bluetooth: hci0: command 0x041b tx timeout 04:40:54 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1154.119676][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 04:40:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1154.292484][ T9852] Bluetooth: hci1: command 0x041b tx timeout 04:40:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1154.419579][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1154.671875][ T3627] device bridge_slave_1 left promiscuous mode [ 1154.702733][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state 04:40:55 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1155.142906][ T3627] device bridge_slave_0 left promiscuous mode [ 1155.149300][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1155.252594][ T9852] Bluetooth: hci2: command 0x041b tx timeout 04:40:56 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1155.902463][ T9852] Bluetooth: hci0: command 0x040f tx timeout 04:40:56 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1156.382433][ T9852] Bluetooth: hci1: command 0x040f tx timeout [ 1156.394512][ T3627] device hsr_slave_0 left promiscuous mode 04:40:57 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:57 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1156.906964][ T3627] device hsr_slave_1 left promiscuous mode [ 1157.265101][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1157.342438][ T9852] Bluetooth: hci2: command 0x040f tx timeout [ 1157.356787][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1157.526927][ T3627] device bridge_slave_1 left promiscuous mode [ 1157.542773][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state 04:40:58 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:58 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1157.630063][ T3627] device bridge_slave_0 left promiscuous mode [ 1157.643386][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1157.972659][ T9852] Bluetooth: hci0: command 0x0419 tx timeout [ 1158.452441][ T9852] Bluetooth: hci1: command 0x0419 tx timeout 04:40:59 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:59 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1159.375449][ T3627] device hsr_slave_0 left promiscuous mode [ 1159.412430][ T9852] Bluetooth: hci2: command 0x0419 tx timeout [ 1160.060305][ T3627] device hsr_slave_1 left promiscuous mode 04:41:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1160.373110][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 04:41:01 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1160.964420][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1161.364474][ T3627] device bridge_slave_1 left promiscuous mode [ 1161.371021][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state 04:41:02 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:02 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1162.613148][ T3627] device bridge_slave_0 left promiscuous mode [ 1162.619473][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:41:03 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:04 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:04 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1164.464946][ T3627] device hsr_slave_0 left promiscuous mode 04:41:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:05 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1165.000961][ T3627] device hsr_slave_1 left promiscuous mode [ 1165.753939][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 04:41:06 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1166.124466][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 04:41:06 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1166.375295][ T3627] device bridge_slave_1 left promiscuous mode [ 1166.381993][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.316419][ T3627] device bridge_slave_0 left promiscuous mode [ 1167.327248][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:41:08 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:08 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:09 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:10 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:10 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:11 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:11 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:12 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1173.267369][ T3627] bond0 (unregistering): Released all slaves 04:41:14 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:14 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:17 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1177.016455][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.022836][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 04:41:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:20 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:21 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:21 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:22 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:23 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1184.660911][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:41:25 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1186.112908][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:41:27 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1186.955987][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:41:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1188.143022][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:41:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1189.342566][ T3574] Bluetooth: hci9: command 0x0406 tx timeout 04:41:30 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:30 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89f", 0x10, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:32 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89f", 0x10, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:34 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89f", 0x10, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1194.348837][ T3627] bond0 (unregistering): Released all slaves 04:41:35 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:36 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49", 0x18, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:37 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:37 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49", 0x18, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49", 0x18, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:38 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe3", 0x1c, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:40 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe3", 0x1c, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1200.745949][ T3627] bond0 (unregistering): Released all slaves 04:41:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:41 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe3", 0x1c, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:42 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be6", 0x1e, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1202.767811][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:41:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:43 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be6", 0x1e, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1203.503781][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:41:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be6", 0x1e, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1204.446091][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:41:45 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611", 0x1f, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1205.724037][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:41:46 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:47 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:47 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611", 0x1f, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:48 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611", 0x1f, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1209.831598][ T9852] Bluetooth: hci11: command 0x0406 tx timeout 04:41:51 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:52 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1212.528646][ T3627] bond0 (unregistering): Released all slaves 04:41:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:53 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:55 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1215.876506][ T3574] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1215.887755][ T3574] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1215.895445][ T3574] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1215.910711][T10718] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1215.919966][T10718] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1215.932761][T10718] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1216.424134][ T3574] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1216.443045][ T3574] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1216.450689][ T3574] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1216.459408][ T3574] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1216.467763][ T3574] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1216.475041][ T3574] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 04:41:57 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1217.282668][ T9852] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1217.291513][ T9852] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1217.306570][ T9852] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1217.318615][ T9852] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1217.330770][ T9852] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 1217.338914][ T9852] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 04:41:58 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1217.973049][ T9852] Bluetooth: hci3: command 0x0409 tx timeout 04:41:59 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1218.532555][ T9852] Bluetooth: hci4: command 0x0409 tx timeout 04:41:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1219.412628][ T9852] Bluetooth: hci5: command 0x0409 tx timeout 04:42:00 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1220.052975][ T9852] Bluetooth: hci3: command 0x041b tx timeout 04:42:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:01 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1220.612527][ T9852] Bluetooth: hci4: command 0x041b tx timeout 04:42:01 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1221.492549][ T9852] Bluetooth: hci5: command 0x041b tx timeout 04:42:02 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1222.132786][ T9852] Bluetooth: hci3: command 0x040f tx timeout [ 1222.464125][ T3627] team0 (unregistering): Port device team_slave_1 removed [ 1222.692435][ T9852] Bluetooth: hci4: command 0x040f tx timeout 04:42:03 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1222.916273][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:42:03 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1223.434542][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1223.572523][ T9852] Bluetooth: hci5: command 0x040f tx timeout [ 1224.212851][ T9852] Bluetooth: hci3: command 0x0419 tx timeout 04:42:05 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1224.772696][ T9852] Bluetooth: hci4: command 0x0419 tx timeout 04:42:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1225.130304][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1225.652559][ T9852] Bluetooth: hci5: command 0x0419 tx timeout 04:42:06 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:06 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:07 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:07 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:08 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:09 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:09 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:10 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:10 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:12 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1232.586138][ T3627] bond0 (unregistering): Released all slaves 04:42:13 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:15 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:15 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:17 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1236.670102][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:42:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:18 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1237.685208][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:42:18 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:18 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1238.457963][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.464316][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 [ 1238.576496][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:42:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1239.274001][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:42:20 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:21 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:22 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:22 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:23 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:24 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:26 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1245.668629][ T3627] bond0 (unregistering): Released all slaves 04:42:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:27 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:29 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:30 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x0, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:32 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x0, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:33 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x0, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1252.969668][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:42:34 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1253.811019][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:42:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x0, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:35 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:35 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x0, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1255.482856][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:42:36 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:37 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x0, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1256.513037][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:42:37 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:39 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:39 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:40 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:42 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:43 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1262.963179][ T3627] bond0 (unregistering): Released all slaves 04:42:44 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:45 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:45 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:46 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:47 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:52 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:54 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1273.689461][ T3627] team0 (unregistering): Port device team_slave_1 removed [ 1274.134139][ T3627] team0 (unregistering): Port device team_slave_0 removed [ 1274.166941][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:42:55 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1275.469281][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:42:56 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:56 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1276.372565][ T9852] Bluetooth: hci2: command 0x0406 tx timeout [ 1276.373836][ T3574] Bluetooth: hci0: command 0x0406 tx timeout [ 1276.378631][ T9852] Bluetooth: hci1: command 0x0406 tx timeout 04:42:57 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:57 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:59 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:01 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:02 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1281.904223][ T3574] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1281.912972][ T3574] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1281.921036][ T3574] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1281.928786][ T3574] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1281.936842][ T3574] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 1281.944114][ T3574] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1282.371276][T10718] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 1282.385384][T10718] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 1282.393498][T10718] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 1282.405749][T10718] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 1282.413949][T10718] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 04:43:03 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1282.421224][T10718] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 1282.894288][ T3627] bond0 (unregistering): Released all slaves 04:43:03 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1283.275924][ T3574] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 1283.284699][ T3574] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 1283.292944][ T3574] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 1283.301194][ T3574] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 1283.308874][ T9852] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 1283.316861][ T9852] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 04:43:04 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1283.972492][ T3574] Bluetooth: hci6: command 0x0409 tx timeout 04:43:04 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x0, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1284.452505][ T3574] Bluetooth: hci7: command 0x0409 tx timeout 04:43:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:06 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x0, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1285.412830][ T3574] Bluetooth: hci8: command 0x0409 tx timeout 04:43:06 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1286.052476][ T3574] Bluetooth: hci6: command 0x041b tx timeout [ 1286.533439][ T3574] Bluetooth: hci7: command 0x041b tx timeout 04:43:08 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1287.492889][ T3574] Bluetooth: hci8: command 0x041b tx timeout [ 1288.132598][ T3574] Bluetooth: hci6: command 0x040f tx timeout [ 1288.612489][ T3574] Bluetooth: hci7: command 0x040f tx timeout 04:43:09 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1289.574432][ T3574] Bluetooth: hci8: command 0x040f tx timeout [ 1290.212434][ T3574] Bluetooth: hci6: command 0x0419 tx timeout 04:43:10 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1290.693887][ T3574] Bluetooth: hci7: command 0x0419 tx timeout 04:43:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1291.652826][T10718] Bluetooth: hci8: command 0x0419 tx timeout 04:43:13 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1293.084440][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:43:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x0, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x0, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1293.933490][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:43:14 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:15 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x0, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1294.771913][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:43:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x0, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1295.840624][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:43:17 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x0, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:18 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x0, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:18 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x0, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:20 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1299.894867][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.901332][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 04:43:21 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406")