dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000010000000a020000", @ANYRESOCT, @ANYRES32=0xee00], 0x30}, 0x0) 04:40:24 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000010000000a020000", @ANYRESOCT], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000010000000a020000"], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x30}, 0x0) [ 1123.810683][T13351] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1123.848085][ T102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x30}, 0x0) [ 1123.872986][ T102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 04:40:24 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:24 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13208000000000"], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c132080"], 0x30}, 0x0) 04:40:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5c13"], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='\\'], 0x30}, 0x0) 04:40:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:25 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) 04:40:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x30}, 0x0) [ 1125.466954][ T9313] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 04:40:26 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:26 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='h'], 0x68}, 0x0) 04:40:28 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 04:40:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) 04:40:28 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:28 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 04:40:29 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0) 04:40:29 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0x68}, 0x0) 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0x68}, 0x0) 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0x68}, 0x0) 04:40:29 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB], 0x68}, 0x0) 04:40:29 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB], 0x68}, 0x0) 04:40:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB], 0x68}, 0x0) 04:40:30 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:30 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:30 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:31 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:33 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:33 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:33 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:34 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:34 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:35 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:35 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:35 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:36 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:37 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:38 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:38 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:38 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:39 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:39 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:40 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:40 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:40 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:41 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:41 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:42 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:42 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:43 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:44 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:46 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:47 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:47 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1148.946597][ T3627] device bridge_slave_1 left promiscuous mode [ 1148.962559][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.209033][ T3627] device bridge_slave_0 left promiscuous mode [ 1149.224265][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1149.673308][T10718] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1149.681876][T10718] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1149.691207][ T9852] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1149.700154][ T9852] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1149.707648][ T9852] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1149.714951][ T9852] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 04:40:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.107605][ T9852] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1150.116616][ T9852] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1150.124822][ T9852] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1150.134106][ T9852] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1150.141551][ T9852] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1150.149512][ T9852] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 04:40:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.357152][ T3627] device hsr_slave_0 left promiscuous mode 04:40:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.399636][ T3627] device hsr_slave_1 left promiscuous mode 04:40:51 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1150.465157][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1150.724510][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1150.843951][ T3627] device bridge_slave_1 left promiscuous mode [ 1150.850192][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.029975][ T9852] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1151.038754][ T3627] device bridge_slave_0 left promiscuous mode [ 1151.039414][ T9852] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1151.052524][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.060112][ T9852] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1151.069772][ T9852] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1151.077408][ T9852] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1151.084738][ T9852] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 04:40:51 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.247235][ T3627] device bridge_slave_0 left promiscuous mode [ 1151.262613][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.408041][ T3627] device bridge_slave_1 left promiscuous mode [ 1151.431538][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.550572][ T3627] device bridge_slave_0 left promiscuous mode [ 1151.572861][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.732590][ T9852] Bluetooth: hci0: command 0x0409 tx timeout 04:40:52 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.790888][ T3627] device hsr_slave_0 left promiscuous mode [ 1151.801087][ T3627] device hsr_slave_1 left promiscuous mode 04:40:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1151.835585][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1152.043481][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1152.128887][ T3627] device bridge_slave_1 left promiscuous mode [ 1152.148339][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1152.212498][ T9852] Bluetooth: hci1: command 0x0409 tx timeout [ 1152.335477][ T3627] device bridge_slave_0 left promiscuous mode [ 1152.341727][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:53 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1152.580347][ T3627] device hsr_slave_0 left promiscuous mode [ 1152.593056][ T3627] device hsr_slave_1 left promiscuous mode [ 1152.599654][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1152.615795][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1152.636620][ T3627] device bridge_slave_1 left promiscuous mode [ 1152.655494][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1152.933228][ T3627] device bridge_slave_0 left promiscuous mode [ 1152.939495][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1153.172474][ T9852] Bluetooth: hci2: command 0x0409 tx timeout 04:40:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1153.568186][ T3627] device hsr_slave_0 left promiscuous mode 04:40:54 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1153.791985][ T3627] device hsr_slave_1 left promiscuous mode [ 1153.812525][ T9852] Bluetooth: hci0: command 0x041b tx timeout 04:40:54 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1154.119676][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 04:40:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1154.292484][ T9852] Bluetooth: hci1: command 0x041b tx timeout 04:40:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1154.419579][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1154.671875][ T3627] device bridge_slave_1 left promiscuous mode [ 1154.702733][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state 04:40:55 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1155.142906][ T3627] device bridge_slave_0 left promiscuous mode [ 1155.149300][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:40:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1155.252594][ T9852] Bluetooth: hci2: command 0x041b tx timeout 04:40:56 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1155.902463][ T9852] Bluetooth: hci0: command 0x040f tx timeout 04:40:56 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1156.382433][ T9852] Bluetooth: hci1: command 0x040f tx timeout [ 1156.394512][ T3627] device hsr_slave_0 left promiscuous mode 04:40:57 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:57 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1156.906964][ T3627] device hsr_slave_1 left promiscuous mode [ 1157.265101][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1157.342438][ T9852] Bluetooth: hci2: command 0x040f tx timeout [ 1157.356787][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1157.526927][ T3627] device bridge_slave_1 left promiscuous mode [ 1157.542773][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state 04:40:58 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:58 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1157.630063][ T3627] device bridge_slave_0 left promiscuous mode [ 1157.643386][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1157.972659][ T9852] Bluetooth: hci0: command 0x0419 tx timeout [ 1158.452441][ T9852] Bluetooth: hci1: command 0x0419 tx timeout 04:40:59 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:40:59 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1159.375449][ T3627] device hsr_slave_0 left promiscuous mode [ 1159.412430][ T9852] Bluetooth: hci2: command 0x0419 tx timeout [ 1160.060305][ T3627] device hsr_slave_1 left promiscuous mode 04:41:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1160.373110][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 04:41:01 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1160.964420][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1161.364474][ T3627] device bridge_slave_1 left promiscuous mode [ 1161.371021][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state 04:41:02 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:02 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1162.613148][ T3627] device bridge_slave_0 left promiscuous mode [ 1162.619473][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:41:03 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:04 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:04 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1164.464946][ T3627] device hsr_slave_0 left promiscuous mode 04:41:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:05 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1165.000961][ T3627] device hsr_slave_1 left promiscuous mode [ 1165.753939][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_0 04:41:06 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1166.124466][ T3627] batman_adv: batadv0: Removing interface: batadv_slave_1 04:41:06 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1166.375295][ T3627] device bridge_slave_1 left promiscuous mode [ 1166.381993][ T3627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1167.316419][ T3627] device bridge_slave_0 left promiscuous mode [ 1167.327248][ T3627] bridge0: port 1(bridge_slave_0) entered disabled state 04:41:08 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:08 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:09 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:10 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:10 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:11 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:11 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:12 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1173.267369][ T3627] bond0 (unregistering): Released all slaves 04:41:14 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:14 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:17 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1177.016455][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.022836][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 04:41:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:20 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:21 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:21 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:22 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:23 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1184.660911][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:41:25 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1186.112908][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:41:27 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1186.955987][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:41:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1188.143022][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:41:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1189.342566][ T3574] Bluetooth: hci9: command 0x0406 tx timeout 04:41:30 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:30 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89f", 0x10, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:32 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:33 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89f", 0x10, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:34 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89f", 0x10, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1194.348837][ T3627] bond0 (unregistering): Released all slaves 04:41:35 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:36 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49", 0x18, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:37 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:37 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49", 0x18, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49", 0x18, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:38 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe3", 0x1c, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:40 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe3", 0x1c, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1200.745949][ T3627] bond0 (unregistering): Released all slaves 04:41:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:41 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe3", 0x1c, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:42 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be6", 0x1e, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1202.767811][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:41:43 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:43 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be6", 0x1e, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1203.503781][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:41:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be6", 0x1e, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1204.446091][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:41:45 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611", 0x1f, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1205.724037][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:41:46 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:47 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:47 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611", 0x1f, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:48 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611", 0x1f, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1209.831598][ T9852] Bluetooth: hci11: command 0x0406 tx timeout 04:41:51 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, 0x0, &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:52 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1212.528646][ T3627] bond0 (unregistering): Released all slaves 04:41:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:53 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:55 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:41:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1215.876506][ T3574] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1215.887755][ T3574] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1215.895445][ T3574] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1215.910711][T10718] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1215.919966][T10718] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1215.932761][T10718] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1216.424134][ T3574] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1216.443045][ T3574] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1216.450689][ T3574] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1216.459408][ T3574] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1216.467763][ T3574] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1216.475041][ T3574] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 04:41:57 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1217.282668][ T9852] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1217.291513][ T9852] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1217.306570][ T9852] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1217.318615][ T9852] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1217.330770][ T9852] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 1217.338914][ T9852] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 04:41:58 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1217.973049][ T9852] Bluetooth: hci3: command 0x0409 tx timeout 04:41:59 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1218.532555][ T9852] Bluetooth: hci4: command 0x0409 tx timeout 04:41:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1219.412628][ T9852] Bluetooth: hci5: command 0x0409 tx timeout 04:42:00 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1220.052975][ T9852] Bluetooth: hci3: command 0x041b tx timeout 04:42:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:01 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1220.612527][ T9852] Bluetooth: hci4: command 0x041b tx timeout 04:42:01 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1221.492549][ T9852] Bluetooth: hci5: command 0x041b tx timeout 04:42:02 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1222.132786][ T9852] Bluetooth: hci3: command 0x040f tx timeout [ 1222.464125][ T3627] team0 (unregistering): Port device team_slave_1 removed [ 1222.692435][ T9852] Bluetooth: hci4: command 0x040f tx timeout 04:42:03 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1222.916273][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:42:03 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1223.434542][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1223.572523][ T9852] Bluetooth: hci5: command 0x040f tx timeout [ 1224.212851][ T9852] Bluetooth: hci3: command 0x0419 tx timeout 04:42:05 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1224.772696][ T9852] Bluetooth: hci4: command 0x0419 tx timeout 04:42:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1225.130304][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1225.652559][ T9852] Bluetooth: hci5: command 0x0419 tx timeout 04:42:06 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:06 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:07 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:07 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:08 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:09 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:09 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:10 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:10 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:12 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1232.586138][ T3627] bond0 (unregistering): Released all slaves 04:42:13 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:15 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:15 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:17 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x0, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1236.670102][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:42:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:18 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1237.685208][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:42:18 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:18 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1238.457963][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.464316][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 [ 1238.576496][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:42:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1239.274001][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:42:20 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:21 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, 0x0, &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:22 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:22 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:23 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:24 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:26 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1245.668629][ T3627] bond0 (unregistering): Released all slaves 04:42:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:27 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], 0x0, 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:29 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:30 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x0, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:31 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:32 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x0, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:33 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x0, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1252.969668][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:42:34 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1253.811019][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:42:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x0, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:35 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:35 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x0, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1255.482856][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:42:36 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:37 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x0, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1256.513037][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:42:37 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:39 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:39 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:40 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:42 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:43 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1262.963179][ T3627] bond0 (unregistering): Released all slaves 04:42:44 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:45 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:45 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:46 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:47 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:48 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x0, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:49 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x0, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x0, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:52 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:53 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:54 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:54 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1273.689461][ T3627] team0 (unregistering): Port device team_slave_1 removed [ 1274.134139][ T3627] team0 (unregistering): Port device team_slave_0 removed [ 1274.166941][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:42:55 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x0, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1275.469281][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:42:56 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:56 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1276.372565][ T9852] Bluetooth: hci2: command 0x0406 tx timeout [ 1276.373836][ T3574] Bluetooth: hci0: command 0x0406 tx timeout [ 1276.378631][ T9852] Bluetooth: hci1: command 0x0406 tx timeout 04:42:57 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:57 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:59 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:42:59 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:01 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:02 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1281.904223][ T3574] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1281.912972][ T3574] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1281.921036][ T3574] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1281.928786][ T3574] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1281.936842][ T3574] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 1281.944114][ T3574] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1282.371276][T10718] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 1282.385384][T10718] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 1282.393498][T10718] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 1282.405749][T10718] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 1282.413949][T10718] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 04:43:03 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1282.421224][T10718] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 1282.894288][ T3627] bond0 (unregistering): Released all slaves 04:43:03 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1283.275924][ T3574] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 1283.284699][ T3574] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 1283.292944][ T3574] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 1283.301194][ T3574] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 1283.308874][ T9852] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 1283.316861][ T9852] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 04:43:04 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1283.972492][ T3574] Bluetooth: hci6: command 0x0409 tx timeout 04:43:04 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x0, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1284.452505][ T3574] Bluetooth: hci7: command 0x0409 tx timeout 04:43:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:06 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x0, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1285.412830][ T3574] Bluetooth: hci8: command 0x0409 tx timeout 04:43:06 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1286.052476][ T3574] Bluetooth: hci6: command 0x041b tx timeout [ 1286.533439][ T3574] Bluetooth: hci7: command 0x041b tx timeout 04:43:08 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1287.492889][ T3574] Bluetooth: hci8: command 0x041b tx timeout [ 1288.132598][ T3574] Bluetooth: hci6: command 0x040f tx timeout [ 1288.612489][ T3574] Bluetooth: hci7: command 0x040f tx timeout 04:43:09 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1289.574432][ T3574] Bluetooth: hci8: command 0x040f tx timeout [ 1290.212434][ T3574] Bluetooth: hci6: command 0x0419 tx timeout 04:43:10 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1290.693887][ T3574] Bluetooth: hci7: command 0x0419 tx timeout 04:43:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1291.652826][T10718] Bluetooth: hci8: command 0x0419 tx timeout 04:43:13 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1293.084440][ T3627] team0 (unregistering): Port device team_slave_1 removed 04:43:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x0, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x0, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1293.933490][ T3627] team0 (unregistering): Port device team_slave_0 removed 04:43:14 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:15 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x0, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1294.771913][ T3627] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 04:43:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x0, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1295.840624][ T3627] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 04:43:17 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x0, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:18 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x0, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:18 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x0, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") 04:43:20 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1299.894867][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.901332][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 04:43:21 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1301.172836][ T28] INFO: task kworker/1:5:10446 blocked for more than 143 seconds. [ 1301.180869][ T28] Not tainted 6.1.75-syzkaller #0 [ 1301.222199][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1301.231248][ T28] task:kworker/1:5 state:D stack:24216 pid:10446 ppid:2 flags:0x00004000 [ 1301.262618][ T28] Workqueue: events switchdev_deferred_process_work [ 1301.269434][ T28] Call Trace: [ 1301.292993][ T28] [ 1301.295986][ T28] __schedule+0x142d/0x4550 [ 1301.300576][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1301.322494][ T28] ? print_irqtrace_events+0x210/0x210 [ 1301.328021][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1301.342531][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1301.348211][ T28] ? lockdep_hardirqs_on+0x94/0x130 04:43:22 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1301.372477][ T28] schedule+0xbf/0x180 [ 1301.376686][ T28] schedule_preempt_disabled+0xf/0x20 [ 1301.396321][ T28] __mutex_lock+0x6b9/0xd80 [ 1301.400879][ T28] ? __mutex_lock+0x53c/0xd80 [ 1301.412506][ T28] ? switchdev_deferred_process_work+0xa/0x20 [ 1301.418621][ T28] ? mutex_lock_nested+0x10/0x10 [ 1301.439504][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1301.452526][ T28] ? process_one_work+0x7a9/0x11d0 [ 1301.457773][ T28] switchdev_deferred_process_work+0xa/0x20 [ 1301.472363][ T28] process_one_work+0x8a9/0x11d0 [ 1301.477364][ T28] ? worker_detach_from_pool+0x260/0x260 [ 1301.502566][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1301.508252][ T28] ? kthread_data+0x4e/0xc0 [ 1301.522436][ T28] ? wq_worker_running+0x97/0x190 [ 1301.527565][ T28] worker_thread+0xa47/0x1200 [ 1301.532268][ T28] ? _raw_spin_unlock+0x40/0x40 [ 1301.549672][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1301.562479][ T28] ? _raw_spin_unlock+0x40/0x40 [ 1301.567384][ T28] kthread+0x28d/0x320 [ 1301.571484][ T28] ? worker_clr_flags+0x190/0x190 [ 1301.592495][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1301.597144][ T28] ret_from_fork+0x1f/0x30 [ 1301.601670][ T28] [ 1301.620423][ T28] INFO: task syz-executor.0:15331 blocked for more than 143 seconds. [ 1301.643122][ T28] Not tainted 6.1.75-syzkaller #0 [ 1301.648704][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 04:43:22 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1301.672453][ T28] task:syz-executor.0 state:D stack:25832 pid:15331 ppid:1 flags:0x00004006 [ 1301.681721][ T28] Call Trace: [ 1301.701287][ T28] [ 1301.704674][ T28] __schedule+0x142d/0x4550 [ 1301.709277][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1301.722515][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1301.733395][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1301.738919][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1301.772125][ T28] schedule+0xbf/0x180 [ 1301.776717][ T28] schedule_preempt_disabled+0xf/0x20 [ 1301.782129][ T28] __mutex_lock+0x6b9/0xd80 [ 1301.802519][ T28] ? __mutex_lock+0x53c/0xd80 [ 1301.807249][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 1301.822391][ T28] ? mutex_lock_nested+0x10/0x10 [ 1301.827477][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1301.833183][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 1301.838161][ T28] ? rtnetlink_bind+0x80/0x80 [ 1301.852372][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1301.857995][ T28] ? kernel_text_address+0x9f/0xd0 [ 1301.878783][ T28] ? __kernel_text_address+0x9/0x40 [ 1301.884477][ T28] ? unwind_get_return_address+0x49/0x80 [ 1301.890204][ T28] ? arch_stack_walk+0xf3/0x140 [ 1301.912509][ T28] ? mark_lock+0x9a/0x340 [ 1301.916913][ T28] ? mark_lock+0x9a/0x340 [ 1301.921273][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1301.938730][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1301.953108][ T28] ? rtnetlink_bind+0x80/0x80 [ 1301.957830][ T28] ? netlink_ack+0x1290/0x1290 [ 1301.973116][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1301.978470][ T28] netlink_unicast+0x7d8/0x970 [ 1301.992401][ T28] ? netlink_detachskb+0x90/0x90 [ 1301.997413][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1302.013011][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1302.018092][ T28] ? __check_object_size+0x4dd/0xa30 [ 1302.032380][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1302.037607][ T28] netlink_sendmsg+0xa26/0xd60 [ 1302.063211][ T28] ? netlink_getsockopt+0x580/0x580 [ 1302.068471][ T28] ? __might_fault+0xa1/0x110 [ 1302.083013][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1302.088085][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1302.102402][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1302.107971][ T28] ? netlink_getsockopt+0x580/0x580 [ 1302.123032][ T28] __sys_sendto+0x480/0x600 [ 1302.127667][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 1302.142421][ T28] __x64_sys_sendto+0xda/0xf0 [ 1302.147162][ T28] do_syscall_64+0x3d/0xb0 [ 1302.151614][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1302.164314][ T28] RIP: 0033:0x7f4ee2a7ea9c [ 1302.168789][ T28] RSP: 002b:00007ffc71e30d50 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1302.184173][ T28] RAX: ffffffffffffffda RBX: 00007f4ee36d4620 RCX: 00007f4ee2a7ea9c [ 1302.192195][ T28] RDX: 0000000000000028 RSI: 00007f4ee36d4670 RDI: 0000000000000003 [ 1302.202788][ T28] RBP: 0000000000000000 R08: 00007ffc71e30da4 R09: 000000000000000c [ 1302.210903][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1302.222537][ T28] R13: 0000000000000000 R14: 00007f4ee36d4670 R15: 0000000000000000 [ 1302.230604][ T28] [ 1302.234662][ T28] INFO: task syz-executor.4:15340 blocked for more than 144 seconds. [ 1302.243454][ T28] Not tainted 6.1.75-syzkaller #0 [ 1302.249021][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1302.258223][ T28] task:syz-executor.4 state:D stack:25832 pid:15340 ppid:1 flags:0x00004006 [ 1302.272527][ T28] Call Trace: [ 1302.276109][ T28] [ 1302.279070][ T28] __schedule+0x142d/0x4550 [ 1302.284352][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1302.289069][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1302.303022][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1302.308556][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1302.314230][ T28] schedule+0xbf/0x180 [ 1302.318466][ T28] schedule_preempt_disabled+0xf/0x20 [ 1302.334708][ T28] __mutex_lock+0x6b9/0xd80 [ 1302.339388][ T28] ? __mutex_lock+0x53c/0xd80 [ 1302.352461][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 1302.357894][ T28] ? mutex_lock_nested+0x10/0x10 [ 1302.371068][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1302.392503][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 1302.397508][ T28] ? rtnetlink_bind+0x80/0x80 [ 1302.402212][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1302.442583][ T28] ? kernel_text_address+0x9f/0xd0 [ 1302.447762][ T28] ? __kernel_text_address+0x9/0x40 [ 1302.471190][ T28] ? unwind_get_return_address+0x49/0x80 [ 1302.482520][ T28] ? arch_stack_walk+0xf3/0x140 [ 1302.487425][ T28] ? mark_lock+0x9a/0x340 [ 1302.491813][ T28] ? mark_lock+0x9a/0x340 [ 1302.513098][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1302.518208][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1302.532516][ T28] ? rtnetlink_bind+0x80/0x80 [ 1302.537242][ T28] ? netlink_ack+0x1290/0x1290 [ 1302.542131][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1302.563127][ T28] netlink_unicast+0x7d8/0x970 [ 1302.567960][ T28] ? netlink_detachskb+0x90/0x90 [ 1302.602476][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1302.607646][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1302.623014][ T28] ? __check_object_size+0x4dd/0xa30 [ 1302.628365][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1302.642394][ T28] netlink_sendmsg+0xa26/0xd60 [ 1302.647220][ T28] ? netlink_getsockopt+0x580/0x580 [ 1302.662385][ T28] ? __might_fault+0xa1/0x110 [ 1302.667221][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1302.672204][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1302.692506][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1302.698032][ T28] ? netlink_getsockopt+0x580/0x580 04:43:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1302.722625][ T28] __sys_sendto+0x480/0x600 [ 1302.727198][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 1302.753134][ T28] __x64_sys_sendto+0xda/0xf0 [ 1302.757884][ T28] do_syscall_64+0x3d/0xb0 [ 1302.773177][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1302.779603][ T28] RIP: 0033:0x7f1ca7e7ea9c [ 1302.802503][ T28] RSP: 002b:00007ffe067d09e0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1302.811058][ T28] RAX: ffffffffffffffda RBX: 00007f1ca8ad4620 RCX: 00007f1ca7e7ea9c 04:43:23 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002e80)=[0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x0, 0x0, 0x7, 0x9}, {0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1302.832446][ T28] RDX: 0000000000000028 RSI: 00007f1ca8ad4670 RDI: 0000000000000003 [ 1302.840469][ T28] RBP: 0000000000000000 R08: 00007ffe067d0a34 R09: 000000000000000c [ 1302.869928][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1302.880889][ T28] R13: 0000000000000000 R14: 00007f1ca8ad4670 R15: 0000000000000000 [ 1302.913087][ T28] [ 1302.916847][ T3627] bond0 (unregistering): Released all slaves [ 1302.921536][ T28] INFO: task syz-executor.3:15362 blocked for more than 145 seconds. [ 1302.935511][ T28] Not tainted 6.1.75-syzkaller #0 [ 1302.952961][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1302.961821][ T28] task:syz-executor.3 state:D stack:25832 pid:15362 ppid:1 flags:0x00004006 [ 1302.991149][ T28] Call Trace: [ 1302.994933][ T28] [ 1302.997893][ T28] __schedule+0x142d/0x4550 [ 1303.012527][ T28] ? __mutex_lock+0x6b4/0xd80 [ 1303.017256][ T28] ? release_firmware_map_entry+0x185/0x185 [ 1303.032385][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 1303.037911][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 1303.052375][ T28] schedule+0xbf/0x180 [ 1303.056495][ T28] schedule_preempt_disabled+0xf/0x20 [ 1303.061900][ T28] __mutex_lock+0x6b9/0xd80 [ 1303.082583][ T28] ? __mutex_lock+0x53c/0xd80 [ 1303.093199][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 1303.098364][ T28] ? mutex_lock_nested+0x10/0x10 [ 1303.122495][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 1303.127674][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 1303.142401][ T28] ? rtnetlink_bind+0x80/0x80 [ 1303.147129][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 1303.152212][ T28] ? kernel_text_address+0x9f/0xd0 [ 1303.166905][ T28] ? __kernel_text_address+0x9/0x40 [ 1303.172162][ T28] ? unwind_get_return_address+0x49/0x80 [ 1303.192625][ T28] ? arch_stack_walk+0xf3/0x140 [ 1303.197543][ T28] ? mark_lock+0x9a/0x340 [ 1303.201916][ T28] ? mark_lock+0x9a/0x340 [ 1303.221915][ T28] ? __lock_acquire+0x125b/0x1f80 [ 1303.242432][ T28] netlink_rcv_skb+0x1cd/0x410 [ 1303.247290][ T28] ? rtnetlink_bind+0x80/0x80 [ 1303.252002][ T28] ? netlink_ack+0x1290/0x1290 [ 1303.272494][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 1303.277761][ T28] netlink_unicast+0x7d8/0x970 [ 1303.290782][ T28] ? netlink_detachskb+0x90/0x90 [ 1303.302656][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 1303.307894][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 1303.322537][ T28] ? __check_object_size+0x4dd/0xa30 [ 1303.327883][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 1303.350356][ T28] netlink_sendmsg+0xa26/0xd60 [ 1303.355758][ T28] ? netlink_getsockopt+0x580/0x580 [ 1303.361055][ T28] ? __might_fault+0xa1/0x110 [ 1303.382461][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 1303.387550][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1303.403032][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 1303.408652][ T28] ? netlink_getsockopt+0x580/0x580 [ 1303.432515][ T28] __sys_sendto+0x480/0x600 [ 1303.437085][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 1303.453083][ T28] __x64_sys_sendto+0xda/0xf0 [ 1303.457891][ T28] do_syscall_64+0x3d/0xb0 [ 1303.472411][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1303.478353][ T28] RIP: 0033:0x7f16f8a7ea9c [ 1303.492484][ T28] RSP: 002b:00007fff6ba67820 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1303.513041][ T28] RAX: ffffffffffffffda RBX: 00007f16f96d4620 RCX: 00007f16f8a7ea9c [ 1303.521055][ T28] RDX: 0000000000000028 RSI: 00007f16f96d4670 RDI: 0000000000000003 [ 1303.542457][ T28] RBP: 0000000000000000 R08: 00007fff6ba67874 R09: 000000000000000c [ 1303.550623][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1303.572558][ T28] R13: 0000000000000000 R14: 00007f16f96d4670 R15: 0000000000000000 [ 1303.580590][ T28] [ 1303.598116][ T28] [ 1303.598116][ T28] Showing all locks held in the system: [ 1303.622064][ T28] 1 lock held by rcu_tasks_kthre/12: [ 1303.628515][ T28] #0: ffffffff8d12a490 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 1303.652440][ T28] 1 lock held by rcu_tasks_trace/13: [ 1303.657847][ T28] #0: ffffffff8d12ac90 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 1303.690149][ T28] 1 lock held by khungtaskd/28: [ 1303.700347][ T28] #0: ffffffff8d12a2c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 [ 1303.724350][ T28] 2 locks held by getty/3306: [ 1303.729059][ T28] #0: ffff88814b1af098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1303.752615][ T28] #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6a7/0x1db0 [ 1303.772388][ T28] 5 locks held by kworker/u4:5/3627: [ 1303.777710][ T28] #0: ffff888012616938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 04:43:24 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1303.822433][ T28] #1: ffffc900055bfd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1303.843131][ T28] #2: ffffffff8e289710 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1303.862508][ T28] #3: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0xd7/0x630 04:43:24 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0)="374f47316f9377cd372fe68dab60d89fdd9a6983b42d3b49dd0ecbe31be611ba", 0x20, 0x0, &(0x7f0000001840), &(0x7f0000001880)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x5, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1303.897039][ T28] #4: ffffffff8d12f780 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x48/0x5f0 [ 1303.922456][ T28] 3 locks held by kworker/1:5/10446: [ 1303.927785][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1303.963624][ T28] #1: ffffc90006167d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1303.990202][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1304.023051][ T28] 3 locks held by kworker/0:8/11820: [ 1304.028385][ T28] #0: ffff888012471d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.063118][ T28] #1: ffffc90005c87d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.082406][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x8d/0xdb0 [ 1304.092202][ T28] 3 locks held by kworker/0:11/11824: [ 1304.112443][ T28] #0: ffff888028798938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.142560][ T28] #1: ffffc900030ffd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.162989][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 1304.182434][ T28] 3 locks held by kworker/1:7/12478: [ 1304.187746][ T28] #0: ffff888028798938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.220648][ T28] #1: ffffc90003b4fd20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.250320][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 1304.273124][ T28] 3 locks held by kworker/0:14/13351: [ 1304.278535][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.302434][ T28] #1: ffffc900032dfd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 1304.322658][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1304.331907][ T28] 3 locks held by syz-executor.1/14123: [ 1304.357861][ T28] 1 lock held by syz-executor.0/15331: [ 1304.369796][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.393070][ T28] 1 lock held by syz-executor.4/15340: [ 1304.398582][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.428807][ T28] 1 lock held by syz-executor.3/15362: [ 1304.434747][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.463113][ T28] 1 lock held by syz-executor.0/15920: [ 1304.468631][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.493045][ T28] 1 lock held by syz-executor.4/15925: [ 1304.498629][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.522434][ T28] 1 lock held by syz-executor.3/15930: [ 1304.535644][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.545965][ T28] 1 lock held by syz-executor.1/16429: [ 1304.551445][ T28] 1 lock held by syz-executor.1/16474: [ 1304.557329][ T28] #0: ffffffff8d12f8b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3b0/0x8a0 [ 1304.573139][ T28] 1 lock held by syz-executor.0/16476: [ 1304.578623][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.603072][ T28] 1 lock held by syz-executor.4/16480: [ 1304.608558][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.633404][ T28] 1 lock held by syz-executor.3/16488: [ 1304.638896][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 1304.652403][ T28] 2 locks held by syz-executor.1/16491: [ 1304.657976][ T28] 1 lock held by syz-executor.1/16500: [ 1304.692671][ T28] 2 locks held by syz-executor.2/16507: [ 1304.698265][ T28] 2 locks held by syz-executor.1/16511: [ 1304.712993][ T28] 2 locks held by syz-executor.1/16515: [ 1304.718576][ T28] 3 locks held by syz-executor.1/16521: [ 1304.742393][ T28] 3 locks held by syz-executor.1/16527: [ 1304.747976][ T28] 2 locks held by syz-executor.1/16532: [ 1304.782373][ T28] 3 locks held by syz-executor.1/16538: [ 1304.787958][ T28] 2 locks held by syz-executor.2/16542: [ 1304.802404][ T28] 2 locks held by syz-executor.2/16550: [ 1304.807995][ T28] 2 locks held by syz-executor.1/16551: [ 1304.822987][ T28] 3 locks held by syz-executor.2/16557: [ 1304.829039][ T28] 2 locks held by syz-executor.1/16562: [ 1304.850463][ T28] 2 locks held by syz-executor.2/16565: [ 1304.862498][ T28] 3 locks held by syz-executor.1/16573: [ 1304.868167][ T28] 2 locks held by syz-executor.2/16574: [ 1304.892561][ T28] 2 locks held by syz-executor.2/16583: [ 1304.898165][ T28] 2 locks held by syz-executor.1/16584: [ 1304.912619][ T28] 3 locks held by syz-executor.2/16594: [ 1304.918188][ T28] 2 locks held by syz-executor.1/16595: [ 1304.924402][ T28] 3 locks held by syz-executor.2/16602: [ 1304.930799][ T28] 3 locks held by syz-executor.1/16621: [ 1304.937883][ T28] 2 locks held by syz-executor.2/16625: [ 1304.952421][ T28] 2 locks held by syz-executor.2/16635: [ 1304.958033][ T28] 3 locks held by syz-executor.1/16636: [ 1304.964030][ T28] 2 locks held by syz-executor.1/16646: [ 1304.969593][ T28] 3 locks held by syz-executor.2/16647: [ 1304.975493][ T28] 2 locks held by syz-executor.2/16654: [ 1304.981127][ T28] 04:43:25 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_clone(0x0, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000001840), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002c00), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002c80)) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB], &(0x7f0000002dc0)='syzkaller\x00', 0x0, 0x1d, &(0x7f0000002e00)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x1, 0x3, 0x1, 0x1f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000002ec0)=[{0x5, 0x5, 0x6, 0x7}, {0x3, 0x1, 0x0, 0x4}, {0x1, 0x2, 0x8, 0x8}, {0x1, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000003080), 0x204302, 0x0) getpid() gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000003240)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000000c0)="50f2507d3a77678232ded8312a15ba02eba781dd2cc6a1e30580c536d55e31652e9d8b9a583be5266e45a6253b891e925815872cd9acc304a55df2f9df99c000610296152eb9fb5bdbf1f5571ea0f2a51c3e6d69293c2b8510fb3e0552e5a736b2cdb95c6f4218bd01aa44713209de11d12df22655fa3703053f412a40f347712bab21ce2dde7f57e0b48e293c49543eeda90ae2a2159dd745097412536fcabd71dd0ef5fb52e1e55e028c74e0367295cb174d3e9763e561dedf6c43590ecda1ca08a38e575eea46f52d2ca19b9de16876705ba0150c9c16f22c1cd4e825957273", 0xe1}, {0x0}, {0x0}, {&(0x7f00000003c0)="239822ad550909494b8a5d60e3fe6465f8af51df4924f61b0ab0fe7d23f348ed981775a70d05ddd7744d29287f28db01cbbd3abb30409b0370ebf608d14f1c4ed954a04a9e2346d35c6c989c7ddb03adc3046189c9a44da8", 0x58}, {&(0x7f0000000440)}], 0x5, &(0x7f00000030c0)=ANY=[], 0x160, 0x4c001}, 0x4000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001780)='memory.oom.group\x00', 0x2, 0x0) gettid() syz_clone(0x220080, &(0x7f0000000200)="0f9be056d87d37e6f2889116fb38d78510f2215819e9646eabd02b93cfeca9262b0bc8914aa78675edd9a8834bc0aeeb879880acc21f5093639ea82525b2028770ac760d01ad7a82c5907a4f5b77bbbbdf1f58acf2435ed55e405df2c4d8c2255b93b41e349097a675ae0ef28984a1afc630264eb3de5bdfd40942ab3704e1add446f709cac0bb8feb225cffeaffa19cf1261fd133409193aa8dbc00091e15a9bb785303956cbd6e23bebce6ff951d086457bb04a363000e8508bafa3fc8c2c818776033ba95ee22d2ea89e3ba66267e605eca648af941878c9410bf81b65ae0da765d6a4d827c1f68", 0xe9, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="eadbfdb91e2ea777b55bc2aebb0cdc9605288633c53264571deb85548f408556f3117cb117888be2e6a225ab0e70c356fec0d88afcc914cd2204808056892ca98c2840aa472a82c1e36406") [ 1304.992552][ T28] ============================================= [ 1304.992552][ T28] [ 1305.000989][ T28] NMI backtrace for cpu 1 [ 1305.005314][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.75-syzkaller #0 [ 1305.013127][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1305.023186][ T28] Call Trace: [ 1305.026471][ T28] [ 1305.029408][ T28] dump_stack_lvl+0x1e3/0x2cb [ 1305.034107][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 1305.039595][ T28] ? panic+0x75d/0x75d [ 1305.043680][ T28] ? vprintk_emit+0x622/0x740 [ 1305.048402][ T28] ? printk_sprint+0x490/0x490 [ 1305.053185][ T28] ? nmi_cpu_backtrace+0x252/0x560 [ 1305.058312][ T28] nmi_cpu_backtrace+0x4e1/0x560 [ 1305.063260][ T28] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 1305.069424][ T28] ? _printk+0xd1/0x111 [ 1305.073591][ T28] ? panic+0x75d/0x75d [ 1305.077673][ T28] ? __wake_up_klogd+0xcc/0x100 [ 1305.082549][ T28] ? panic+0x75d/0x75d [ 1305.086634][ T28] ? nmi_trigger_cpumask_backtrace+0xe2/0x3f0 [ 1305.092719][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1305.098871][ T28] nmi_trigger_cpumask_backtrace+0x1b0/0x3f0 [ 1305.104871][ T28] watchdog+0xf88/0xfd0 [ 1305.109089][ T28] ? watchdog+0x1f8/0xfd0 [ 1305.113431][ T28] kthread+0x28d/0x320 [ 1305.117509][ T28] ? hungtask_pm_notify+0x50/0x50 [ 1305.122546][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1305.127158][ T28] ret_from_fork+0x1f/0x30 [ 1305.131605][ T28] [ 1305.135482][ T28] Sending NMI from CPU 1 to CPUs 0: [ 1305.140900][ C0] NMI backtrace for cpu 0 [ 1305.140909][ C0] CPU: 0 PID: 16450 Comm: syz-executor.1 Not tainted 6.1.75-syzkaller #0 [ 1305.140926][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1305.140934][ C0] RIP: 0010:do_raw_spin_unlock+0xb6/0x8a0 [ 1305.140954][ C0] Code: 48 8b 2d 2d c7 96 7e 49 39 6d 00 0f 85 30 02 00 00 4d 8d 77 08 4c 89 f3 48 c1 eb 03 48 b8 00 00 00 00 00 fc ff df 0f b6 04 03 <84> c0 0f 85 ea 03 00 00 41 8b 06 65 8b 0d 58 71 96 7e 39 c8 0f 85 [ 1305.140967][ C0] RSP: 0018:ffffc90006fc70b0 EFLAGS: 00000a06 [ 1305.140980][ C0] RAX: 0000000000000000 RBX: 1ffff1100a203bb1 RCX: ffffffff816ba7d4 [ 1305.140991][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88805101dd80 [ 1305.141000][ C0] RBP: ffff8880242c5940 R08: dffffc0000000000 R09: ffffed100a203bb1 [ 1305.141011][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1100a203bb2 [ 1305.141021][ C0] R13: ffff88805101dd90 R14: ffff88805101dd88 R15: ffff88805101dd80 [ 1305.141032][ C0] FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 1305.141045][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1305.141055][ C0] CR2: 0000555555deada8 CR3: 00000000908e7000 CR4: 00000000003506f0 [ 1305.141074][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1305.141082][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1305.141091][ C0] Call Trace: [ 1305.141095][ C0] [ 1305.141100][ C0] ? nmi_cpu_backtrace+0x3de/0x560 [ 1305.141123][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1305.141145][ C0] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 1305.141167][ C0] ? nmi_handle+0x25/0x440 [ 1305.141270][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1305.141292][ C0] ? nmi_handle+0x12e/0x440 [ 1305.141313][ C0] ? nmi_handle+0x25/0x440 [ 1305.141333][ C0] ? do_raw_spin_unlock+0xb6/0x8a0 [ 1305.141348][ C0] ? default_do_nmi+0x62/0x150 [ 1305.141362][ C0] ? exc_nmi+0xab/0x120 [ 1305.141375][ C0] ? end_repeat_nmi+0x16/0x31 [ 1305.141399][ C0] ? do_raw_spin_unlock+0x54/0x8a0 [ 1305.141414][ C0] ? do_raw_spin_unlock+0xb6/0x8a0 [ 1305.141429][ C0] ? do_raw_spin_unlock+0xb6/0x8a0 [ 1305.141444][ C0] ? do_raw_spin_unlock+0xb6/0x8a0 [ 1305.141459][ C0] [ 1305.141463][ C0] [ 1305.141469][ C0] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1305.141487][ C0] _raw_spin_unlock+0x1a/0x40 [ 1305.141504][ C0] delete_from_page_cache_batch+0xaa2/0xc90 [ 1305.141548][ C0] ? filemap_remove_folio+0x2e0/0x2e0 [ 1305.141568][ C0] ? folio_memcg_rcu+0x220/0x220 [ 1305.141606][ C0] ? ext4_invalidate_folio+0x12e/0x300 [ 1305.141645][ C0] ? ext4_da_write_end+0xa70/0xa70 [ 1305.141665][ C0] ? truncate_cleanup_folio+0x2d0/0x5e0 [ 1305.141743][ C0] truncate_inode_pages_range+0x370/0x1340 [ 1305.141777][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1305.141797][ C0] ? mapping_evict_folio+0x5b0/0x5b0 [ 1305.141820][ C0] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1305.141847][ C0] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1305.141863][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 1305.141882][ C0] ext4_evict_inode+0x39c/0x1150 [ 1305.141897][ C0] ? _raw_spin_unlock+0x24/0x40 [ 1305.141913][ C0] ? inode_wait_for_writeback+0x21f/0x280 [ 1305.141950][ C0] ? evict+0x26f/0x620 [ 1305.141986][ C0] ? sb_clear_inode_writeback+0x400/0x400 [ 1305.142009][ C0] ? ext4_inode_is_fast_symlink+0x390/0x390 [ 1305.142025][ C0] ? do_raw_spin_unlock+0x137/0x8a0 [ 1305.142039][ C0] ? _raw_spin_unlock+0x24/0x40 [ 1305.142056][ C0] ? ext4_inode_is_fast_symlink+0x390/0x390 [ 1305.142077][ C0] evict+0x2a4/0x620 [ 1305.142100][ C0] __dentry_kill+0x436/0x650 [ 1305.142118][ C0] dentry_kill+0xbb/0x290 [ 1305.142132][ C0] ? dput+0x4e/0x470 [ 1305.142145][ C0] dput+0x21a/0x470 [ 1305.142160][ C0] __fput+0x5e4/0x890 [ 1305.142182][ C0] task_work_run+0x246/0x300 [ 1305.142199][ C0] ? kasan_quarantine_put+0xd4/0x220 [ 1305.142249][ C0] ? task_work_cancel+0x2b0/0x2b0 [ 1305.142267][ C0] ? kmem_cache_free+0x292/0x510 [ 1305.142284][ C0] ? do_exit+0xa6e/0x26a0 [ 1305.142336][ C0] do_exit+0xa73/0x26a0 [ 1305.142352][ C0] ? nfs_ssc_unregister+0x30/0x30 [ 1305.142388][ C0] ? put_task_struct+0x80/0x80 [ 1305.142416][ C0] do_group_exit+0x202/0x2b0 [ 1305.142434][ C0] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1305.142451][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 1305.142468][ C0] get_signal+0x16f7/0x17d0 [ 1305.142495][ C0] ? ptrace_notify+0x370/0x370 [ 1305.142515][ C0] ? force_sig_info_to_task+0x34a/0x470 [ 1305.142537][ C0] arch_do_signal_or_restart+0xb0/0x1a10 [ 1305.142555][ C0] ? print_irqtrace_events+0x210/0x210 [ 1305.142577][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 1305.142593][ C0] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1305.142611][ C0] ? _raw_spin_unlock+0x40/0x40 [ 1305.142627][ C0] ? __send_signal_locked+0xb43/0xdc0 [ 1305.142649][ C0] ? get_sigframe_size+0x10/0x10 [ 1305.142665][ C0] ? force_sig_info_to_task+0x34a/0x470 [ 1305.142689][ C0] ? force_sig+0x114/0x1d0 [ 1305.142709][ C0] ? exit_to_user_mode_loop+0x39/0x100 [ 1305.142733][ C0] exit_to_user_mode_loop+0x6a/0x100 [ 1305.142755][ C0] exit_to_user_mode_prepare+0xb1/0x140 [ 1305.142777][ C0] irqentry_exit_to_user_mode+0x5/0x40 [ 1305.142792][ C0] exc_general_protection+0x3e0/0x590 [ 1305.142815][ C0] ? print_irqtrace_events+0x210/0x210 [ 1305.142845][ C0] asm_exc_general_protection+0x22/0x30 [ 1305.142864][ C0] RIP: 0033:0x7fde4547cdb1 [ 1305.142876][ C0] Code: Unable to access opcode bytes at 0x7fde4547cd87. [ 1305.142882][ C0] RSP: 002b:00000000200002e0 EFLAGS: 00010217 [ 1305.142894][ C0] RAX: 0000000000000000 RBX: 00007fde455abf80 RCX: 00007fde4547cda9 [ 1305.142904][ C0] RDX: 0000000020000300 RSI: 00000000200002e0 RDI: 0000000000220080 [ 1305.142914][ C0] RBP: 00007fde454c947a R08: 0000000020000380 R09: 0000000020000380 [ 1305.142923][ C0] R10: 0000000020000340 R11: 0000000000000202 R12: 0000000000000000 [ 1305.142932][ C0] R13: 000000000000000b R14: 00007fde455abf80 R15: 00007ffecacc7b58 [ 1305.142950][ C0] [ 1305.264176][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 1305.264191][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.75-syzkaller #0 [ 1305.264209][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1305.264219][ T28] Call Trace: [ 1305.264225][ T28] [ 1305.264231][ T28] dump_stack_lvl+0x1e3/0x2cb [ 1305.264262][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 1305.264283][ T28] ? panic+0x75d/0x75d [ 1305.264300][ T28] ? llist_add_batch+0x160/0x1d0 [ 1305.264324][ T28] ? vscnprintf+0x59/0x80 [ 1305.264343][ T28] panic+0x318/0x75d [ 1305.264361][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 1305.264384][ T28] ? memcpy_page_flushcache+0xfc/0xfc [ 1305.264405][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 1305.264425][ T28] ? nmi_trigger_cpumask_backtrace+0x33a/0x3f0 [ 1305.264449][ T28] ? nmi_trigger_cpumask_backtrace+0x33f/0x3f0 [ 1305.264474][ T28] watchdog+0xfc7/0xfd0 [ 1305.264498][ T28] ? watchdog+0x1f8/0xfd0 [ 1305.264520][ T28] kthread+0x28d/0x320 [ 1305.264540][ T28] ? hungtask_pm_notify+0x50/0x50 [ 1305.264564][ T28] ? kthread_blkcg+0xd0/0xd0 [ 1305.264586][ T28] ret_from_fork+0x1f/0x30 [ 1305.264617][ T28] [ 1305.268734][ T28] Kernel Offset: disabled [ 1305.843380][ T28] Rebooting in 86400 seconds..