0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:28 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:28 executing program 2: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:28 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:29 executing program 2: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:29 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:29 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) 10:51:29 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(0x0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:38 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x0, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) recvmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 10:51:38 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 2: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x4, 0x0) 10:51:38 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(0x0, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:38 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:51:38 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x0, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:38 executing program 0: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000400)={0xf9, 0x19, &(0x7f0000000000)="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"}) r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:51:38 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(0x0, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:38 executing program 0: r0 = getpid() pidfd_open(0xffffffffffffffff, 0x0) r1 = pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) ptrace$pokeuser(0x6, r2, 0xff, 0x6) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:51:49 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x5, 0x4, 0x7, 0x8, 0x0, 0xf, 0x48004, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x822, 0x1f, 0x7, 0x8, 0xae24, 0x8, 0x2, 0x0, 0x3, 0x0, 0x1f}, r0, 0x0, 0xffffffffffffffff, 0x54711f90f18b29f2) 10:51:49 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x0, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(0x0, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:49 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) recvmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 10:51:49 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) r2 = io_uring_setup(0x4c55, &(0x7f0000000000)={0x0, 0x9675, 0x0, 0x3, 0x352}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000080)={0x9, 0x100000001, 0x5, 0x338, 0x3, [{0x4c, 0x2, 0x8, '\x00', 0x1088}, {0x3, 0xde4, 0x8, '\x00', 0x1}, {0xcdfc, 0x0, 0xad7b, '\x00', 0x2008}]}) 10:51:49 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:51:49 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x0) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:49 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x0, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:49 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = fork() ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0xb0, 0x9}) r4 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) poll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x4000}, {r4, 0x14a}, {0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0xa15fcb352d375c3f}], 0x4, 0x3f5d) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r6 = getpid() r7 = pidfd_open(r6, 0x0) copy_file_range(r7, 0x0, r5, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)={0x0}) r9 = syz_io_uring_setup(0x3cfd, &(0x7f0000000240)={0x0, 0x20000000, 0x2, 0xfffffffc, 0x16d}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_PROBE(r9, 0x8, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000080)={r8, 0x2, r9, 0xa0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r8, 0x0, 0xffffffffffffffff, 0x7, 0x80000}) r10 = epoll_create1(0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={r8, 0x2, r10, 0x1ff}) tkill(r2, 0x31) ioprio_get$pid(0x1, r2) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:51:59 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x0, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x0) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:59 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0xb0, 0x9}) r5 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) poll(&(0x7f0000000200)=[{r3, 0x4000}, {r5, 0x14a}, {r3, 0x80}, {r2, 0xa15fcb352d375c3f}], 0x4, 0x3f5d) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r7 = getpid() r8 = pidfd_open(r7, 0x0) copy_file_range(r8, 0x0, r6, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000180)={0x0}) r10 = syz_io_uring_setup(0x3cfc, &(0x7f0000000240)={0x0, 0x20000000, 0x0, 0x0, 0x3}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_PROBE(r10, 0x8, 0x0, 0x0) tkill(0x0, 0x33) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f0000000080)={r9, 0x2, r10, 0xa0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000100)={r9, 0x0, r2, 0x7, 0x80000}) r11 = fcntl$dupfd(r1, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={r9, 0x4, r11, 0x8, 0x80000}) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:51:59 executing program 4: r0 = getpid() pidfd_open(0xffffffffffffffff, 0x0) r1 = pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) ptrace$pokeuser(0x6, r2, 0xff, 0x6) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:51:59 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:51:59 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:51:59 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x0) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:51:59 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0xff, 0xffff) 10:51:59 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 6: clone3(0x0, 0x0) 10:51:59 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x0, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:51:59 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:51:59 executing program 6: clone3(0x0, 0x0) 10:52:10 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(0x0, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:10 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000000)={0x1, 0x0, 0x3, 0x7f, 0xffffc65b, 0x5}) r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:52:10 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:10 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:52:10 executing program 6: clone3(0x0, 0x0) 10:52:10 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x0, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:10 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:10 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0xb0, 0x9}) r5 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) poll(&(0x7f0000000200)=[{r3, 0x4000}, {r5, 0x14a}, {r3, 0x80}, {r2, 0xa15fcb352d375c3f}], 0x4, 0x3f5d) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r7 = getpid() r8 = pidfd_open(r7, 0x0) copy_file_range(r8, 0x0, r6, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000180)={0x0}) r10 = syz_io_uring_setup(0x3cfc, &(0x7f0000000240)={0x0, 0x20000000, 0x0, 0x0, 0x3}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_PROBE(r10, 0x8, 0x0, 0x0) tkill(0x0, 0x33) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f0000000080)={r9, 0x2, r10, 0xa0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000100)={r9, 0x0, r2, 0x7, 0x80000}) r11 = fcntl$dupfd(r1, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={r9, 0x4, r11, 0x8, 0x80000}) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 10:52:10 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) pwritev(r1, 0x0, 0x0, 0x4, 0x0) 10:52:10 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:10 executing program 0: r0 = getpid() ptrace$getregset(0x4204, r0, 0x6, &(0x7f0000000240)={&(0x7f00000001c0)=""/95, 0x5f}) r1 = pidfd_open(r0, 0x0) r2 = inotify_init1(0x80000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x0, 0x0) pidfd_getfd(r3, r1, 0x0) r4 = dup(r2) r5 = signalfd(r2, &(0x7f0000000000)={[0xe0d]}, 0x8) pwritev(r5, 0x0, 0x60, 0x5, 0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r7, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x81}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x7fff, 0x4, 0x98]}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000041}, 0x20000804) 10:52:22 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 0: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x24, &(0x7f0000000080), 0x4) pwritev(r1, 0x0, 0x0, 0x0, 0x8001) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) 10:52:22 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:52:22 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x0, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(0x0, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:22 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x0, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(0x0, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:22 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 0: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) fork() kcmp(r1, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:22 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:22 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:23 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) fork() kcmp(r1, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:31 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:31 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:32 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:32 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:32 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:32 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:32 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:52:32 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) fork() kcmp(r1, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:32 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:41 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x0, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 4: clone3(0x0, 0x0) 10:52:41 executing program 4: clone3(0x0, 0x0) 10:52:41 executing program 4: clone3(0x0, 0x0) 10:52:41 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x0, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 4: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:41 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 4: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 4: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x0, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:41 executing program 1: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:52:51 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:52:51 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x0, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:53:00 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:00 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:01 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:01 executing program 0: clone3(0x0, 0x0) 10:53:01 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:01 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:01 executing program 0: clone3(0x0, 0x0) 10:53:01 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:01 executing program 4: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:53:01 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x0, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:01 executing program 0: clone3(0x0, 0x0) 10:53:15 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x0, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 0: clone3(&(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 0: clone3(&(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x0, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 0: clone3(&(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:15 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x0, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:53:25 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x0, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:25 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x0, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x0, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x0, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x0, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:38 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x0, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x0}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:39 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:39 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:39 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x0, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:39 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:39 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:39 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x0, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x0}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x0, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x0, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:48 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x0, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x0}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x0, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x0, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:58 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 750.118185] cgroup: fork rejected by pids controller in /syz4 10:53:59 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:59 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:59 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x0, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:59 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:53:59 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x0, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:09 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:10 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x0, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:10 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x0, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:23 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:24 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:24 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:24 executing program 3: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:24 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:24 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:24 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:36 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x0, 0x0, &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:37 executing program 3: clone3(0x0, 0x0) 10:54:37 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 3: clone3(0x0, 0x0) 10:54:47 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 3: clone3(0x0, 0x0) 10:54:47 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:47 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 3: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:56 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 3: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 0: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) r2 = fork() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x24, &(0x7f0000000080), 0x4) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000100)={{r4}, 0x9, 0x100000001, 0x100}) tkill(r2, 0x31) getpgrp(r2) r5 = pidfd_open(r0, 0x0) pwritev(r5, 0x0, 0x0, 0x0, 0x0) 10:54:57 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 3: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 0: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) r2 = fork() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x24, &(0x7f0000000080), 0x4) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000100)={{r4}, 0x9, 0x100000001, 0x100}) tkill(r2, 0x31) getpgrp(r2) r5 = pidfd_open(r0, 0x0) pwritev(r5, 0x0, 0x0, 0x0, 0x0) 10:54:57 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:54:57 executing program 0: r0 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) r2 = fork() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x24, &(0x7f0000000080), 0x4) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000100)={{r4}, 0x9, 0x100000001, 0x100}) tkill(r2, 0x31) getpgrp(r2) r5 = pidfd_open(r0, 0x0) pwritev(r5, 0x0, 0x0, 0x0, 0x0) 10:55:08 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:08 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 6: clone3(0x0, 0x0) 10:55:17 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 6: clone3(0x0, 0x0) 10:55:17 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 0: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 6: clone3(0x0, 0x0) 10:55:17 executing program 1: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x3, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000005c0)={{0x8000, 0x3}, 0x100, './file0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) poll(&(0x7f0000000140)=[{r2}, {r3, 0x8008}], 0x2, 0x8) pread64(r1, &(0x7f0000000040)=""/119, 0x77, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x4) 10:55:17 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:17 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:55:17 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:18 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:18 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x3, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000005c0)={{0x8000, 0x3}, 0x100, './file0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) poll(&(0x7f0000000140)=[{r2}, {r3, 0x8008}], 0x2, 0x8) pread64(r1, &(0x7f0000000040)=""/119, 0x77, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x4) 10:55:18 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x3, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000005c0)={{0x8000, 0x3}, 0x100, './file0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) poll(&(0x7f0000000140)=[{r2}, {r3, 0x8008}], 0x2, 0x8) pread64(r1, &(0x7f0000000040)=""/119, 0x77, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x512800, 0x12) close(r4) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execve(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 10:55:29 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x3, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000005c0)={{0x8000, 0x3}, 0x100, './file0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x24, &(0x7f0000000080), 0x4) poll(&(0x7f0000000140)=[{r2}, {r3, 0x8008}], 0x2, 0x8) pread64(r1, &(0x7f0000000040)=""/119, 0x77, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x4) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x512800, 0x12) 10:55:29 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 3: r0 = fork() tkill(r0, 0x31) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x86}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) syz_io_uring_setup(0x759b, &(0x7f0000000080)={0x0, 0xc6f5, 0x0, 0x1, 0x383, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd_index=0x2, 0x4, 0x0, 0xfffff006, 0x1, 0x1, {0x0, r3}}, 0x1797aaf9) 10:55:29 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 0: r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={r1, 0xee00}, 0xc) r2 = pidfd_open(r0, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = fork() tkill(r3, 0x31) waitid(0x1, r3, &(0x7f0000000080), 0x4, &(0x7f0000000100)) 10:55:29 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:29 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 3: r0 = fork() tkill(r0, 0x31) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x86}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) syz_io_uring_setup(0x759b, &(0x7f0000000080)={0x0, 0xc6f5, 0x0, 0x1, 0x383, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd_index=0x2, 0x4, 0x0, 0xfffff006, 0x1, 0x1, {0x0, r3}}, 0x1797aaf9) 10:55:38 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 1: clone3(0x0, 0x0) 10:55:38 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 0: r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={r1, 0xee00}, 0xc) r2 = pidfd_open(r0, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = fork() tkill(r3, 0x31) waitid(0x1, r3, &(0x7f0000000080), 0x4, &(0x7f0000000100)) 10:55:38 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 10:55:38 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 849.668037] FAULT_INJECTION: forcing a failure. [ 849.668037] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 849.669109] CPU: 1 UID: 0 PID: 15199 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 849.669126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 849.669134] Call Trace: [ 849.669139] [ 849.669145] dump_stack_lvl+0xfa/0x120 [ 849.669173] should_fail_ex+0x4d7/0x5e0 [ 849.669195] _copy_from_user+0x30/0xd0 [ 849.669215] copy_clone_args_from_user+0x152/0x7a0 [ 849.669232] ? find_held_lock+0x2b/0x80 [ 849.669247] ? get_pid_task+0xfd/0x250 [ 849.669263] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 849.669278] ? get_pid_task+0x107/0x250 [ 849.669291] ? proc_fail_nth_write+0x97/0x220 [ 849.669304] ? find_held_lock+0x2b/0x80 [ 849.669317] ? ksys_write+0x121/0x240 [ 849.669337] ? lock_is_held_type+0x9e/0x120 [ 849.669353] __do_sys_clone3+0xa5/0x280 [ 849.669368] ? __pfx___do_sys_clone3+0x10/0x10 [ 849.669385] ? __mutex_unlock_slowpath+0x157/0x750 [ 849.669400] ? kernel_write+0x623/0x660 [ 849.669419] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 849.669434] ? __fget_files+0x20d/0x3b0 [ 849.669456] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 849.669476] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 849.669497] ? ksys_write+0x1a3/0x240 [ 849.669514] ? __pfx_ksys_write+0x10/0x10 [ 849.669537] do_syscall_64+0xbf/0x3f0 [ 849.669554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 849.669566] RIP: 0033:0x7f5814920b19 [ 849.669575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 849.669587] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 849.669600] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 849.669608] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 849.669615] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 849.669623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 849.669630] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 849.669646] 10:55:38 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 10:55:38 executing program 1: clone3(0x0, 0x0) [ 849.783328] FAULT_INJECTION: forcing a failure. [ 849.783328] name failslab, interval 1, probability 0, space 0, times 1 [ 849.784422] CPU: 1 UID: 0 PID: 15212 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 849.784439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 849.784447] Call Trace: [ 849.784451] [ 849.784456] dump_stack_lvl+0xfa/0x120 [ 849.784478] should_fail_ex+0x4d7/0x5e0 [ 849.784500] should_failslab+0xc2/0x120 [ 849.784521] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 849.784537] ? find_held_lock+0x2b/0x80 [ 849.784552] ? copy_process+0x3da/0x7420 [ 849.784568] ? copy_process+0x459/0x7420 [ 849.784585] ? copy_process+0x459/0x7420 [ 849.784599] copy_process+0x459/0x7420 [ 849.784614] ? __pfx__kstrtoull+0x10/0x10 [ 849.784629] ? lock_acquire+0x15e/0x2f0 [ 849.784647] ? __might_fault+0xe0/0x190 [ 849.784667] ? __pfx_copy_process+0x10/0x10 [ 849.784682] ? __might_fault+0xe0/0x190 [ 849.784700] ? _copy_from_user+0x5b/0xd0 [ 849.784721] kernel_clone+0xea/0x7f0 [ 849.784735] ? get_pid_task+0xfd/0x250 [ 849.784751] ? __pfx_kernel_clone+0x10/0x10 [ 849.784774] ? find_held_lock+0x2b/0x80 [ 849.784790] ? ksys_write+0x121/0x240 [ 849.784810] ? lock_is_held_type+0x9e/0x120 [ 849.784826] __do_sys_clone3+0x1f5/0x280 [ 849.784842] ? __pfx___do_sys_clone3+0x10/0x10 [ 849.784865] ? __fget_files+0x20d/0x3b0 [ 849.784886] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 849.784907] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 849.784927] ? ksys_write+0x1a3/0x240 [ 849.784944] ? __pfx_ksys_write+0x10/0x10 [ 849.784966] do_syscall_64+0xbf/0x3f0 [ 849.784983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 849.784996] RIP: 0033:0x7f5814920b19 [ 849.785006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 849.785017] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 849.785029] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 849.785037] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 849.785045] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 849.785052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 849.785059] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 849.785075] 10:55:38 executing program 1: clone3(0x0, 0x0) 10:55:38 executing program 4: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 10:55:38 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 3: r0 = fork() tkill(r0, 0x31) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x86}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) syz_io_uring_setup(0x759b, &(0x7f0000000080)={0x0, 0xc6f5, 0x0, 0x1, 0x383, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd_index=0x2, 0x4, 0x0, 0xfffff006, 0x1, 0x1, {0x0, r3}}, 0x1797aaf9) 10:55:38 executing program 0: r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={r1, 0xee00}, 0xc) r2 = pidfd_open(r0, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = fork() tkill(r3, 0x31) waitid(0x1, r3, &(0x7f0000000080), 0x4, &(0x7f0000000100)) 10:55:38 executing program 1: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:38 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) [ 850.157223] FAULT_INJECTION: forcing a failure. [ 850.157223] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 850.158454] CPU: 0 UID: 0 PID: 15456 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 850.158472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.158480] Call Trace: [ 850.158485] [ 850.158490] dump_stack_lvl+0xfa/0x120 [ 850.158512] should_fail_ex+0x4d7/0x5e0 [ 850.158535] should_fail_alloc_page+0xe0/0x110 [ 850.158559] prepare_alloc_pages+0x1eb/0x550 [ 850.158580] ? __lock_acquire+0x694/0x1b70 [ 850.158602] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 850.158616] ? lock_release+0xc8/0x290 [ 850.158637] ? lock_acquire+0x15e/0x2f0 [ 850.158655] ? __memcg_slab_post_alloc_hook+0x443/0x9e0 [ 850.158674] ? find_held_lock+0x2b/0x80 [ 850.158688] ? __memcg_slab_post_alloc_hook+0x4a2/0x9e0 [ 850.158706] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 850.158725] ? __create_object+0x59/0x80 [ 850.158741] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 850.158767] ? kmem_cache_alloc_node_noprof+0x283/0x6b0 [ 850.158782] ? find_held_lock+0x2b/0x80 [ 850.158796] ? __asan_memset+0x24/0x50 [ 850.158820] __alloc_pages_noprof+0xb/0x30 [ 850.158833] copy_process+0x4e9/0x7420 [ 850.158851] ? __lock_acquire+0x694/0x1b70 [ 850.158872] ? lock_acquire+0x15e/0x2f0 [ 850.158890] ? __might_fault+0xe0/0x190 [ 850.158911] ? __pfx_copy_process+0x10/0x10 [ 850.158928] ? __might_fault+0xe0/0x190 [ 850.158948] ? _copy_from_user+0x5b/0xd0 [ 850.158970] kernel_clone+0xea/0x7f0 [ 850.158985] ? find_held_lock+0x2b/0x80 [ 850.159000] ? __pfx_kernel_clone+0x10/0x10 [ 850.159023] ? trace_sched_exit_tp+0xbf/0x100 [ 850.159040] __do_sys_clone3+0x1f5/0x280 [ 850.159056] ? __pfx___do_sys_clone3+0x10/0x10 [ 850.159084] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 850.159108] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 850.159128] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 850.159150] ? ksys_write+0x1a3/0x240 [ 850.159171] ? xfd_validate_state+0x55/0x180 [ 850.159198] do_syscall_64+0xbf/0x3f0 [ 850.159216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.159230] RIP: 0033:0x7f5814920b19 [ 850.159244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.159256] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 850.159273] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 850.159282] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 850.159290] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.159298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 850.159307] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 850.159324] 10:55:47 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 10:55:47 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) (fail_nth: 1) 10:55:47 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 10:55:47 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:55:47 executing program 1: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:47 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 10:55:47 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:47 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 859.165328] FAULT_INJECTION: forcing a failure. [ 859.165328] name failslab, interval 1, probability 0, space 0, times 0 [ 859.166273] CPU: 1 UID: 0 PID: 15562 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 859.166289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.166297] Call Trace: [ 859.166301] [ 859.166306] dump_stack_lvl+0xfa/0x120 [ 859.166329] should_fail_ex+0x4d7/0x5e0 [ 859.166350] ? prepare_creds+0x2c/0x7e0 [ 859.166369] should_failslab+0xc2/0x120 [ 859.166390] kmem_cache_alloc_noprof+0x80/0x690 [ 859.166409] ? prepare_creds+0x2c/0x7e0 [ 859.166425] prepare_creds+0x2c/0x7e0 [ 859.166444] copy_creds+0x7c/0xa30 [ 859.166463] copy_process+0xf59/0x7420 [ 859.166479] ? __pfx__kstrtoull+0x10/0x10 [ 859.166499] ? __pfx_copy_process+0x10/0x10 [ 859.166514] ? __might_fault+0xe0/0x190 [ 859.166534] ? _copy_from_user+0x5b/0xd0 [ 859.166554] kernel_clone+0xea/0x7f0 [ 859.166569] ? get_pid_task+0xfd/0x250 [ 859.166584] ? __pfx_kernel_clone+0x10/0x10 [ 859.166603] ? find_held_lock+0x2b/0x80 [ 859.166617] ? ksys_write+0x121/0x240 [ 859.166636] ? lock_is_held_type+0x9e/0x120 [ 859.166652] __do_sys_clone3+0x1f5/0x280 [ 859.166668] ? __pfx___do_sys_clone3+0x10/0x10 [ 859.166690] ? __fget_files+0x20d/0x3b0 [ 859.166711] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.166732] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.166751] ? ksys_write+0x1a3/0x240 [ 859.166773] ? __pfx_ksys_write+0x10/0x10 [ 859.166795] do_syscall_64+0xbf/0x3f0 [ 859.166812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.166825] RIP: 0033:0x7f5814920b19 [ 859.166834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.166845] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 859.166858] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 859.166866] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 859.166873] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.166881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.166888] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 859.166904] [ 859.204384] FAULT_INJECTION: forcing a failure. [ 859.204384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 859.206124] CPU: 0 UID: 0 PID: 15568 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 859.206153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.206166] Call Trace: [ 859.206174] [ 859.206182] dump_stack_lvl+0xfa/0x120 [ 859.206213] should_fail_ex+0x4d7/0x5e0 [ 859.206250] _copy_from_user+0x30/0xd0 [ 859.206285] copy_clone_args_from_user+0x152/0x7a0 [ 859.206312] ? find_held_lock+0x2b/0x80 [ 859.206337] ? get_pid_task+0xfd/0x250 [ 859.206364] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 859.206392] ? get_pid_task+0x107/0x250 [ 859.206418] ? proc_fail_nth_write+0x97/0x220 [ 859.206440] ? find_held_lock+0x2b/0x80 [ 859.206464] ? ksys_write+0x121/0x240 [ 859.206497] ? lock_is_held_type+0x9e/0x120 [ 859.206525] __do_sys_clone3+0xa5/0x280 [ 859.206554] ? __pfx___do_sys_clone3+0x10/0x10 [ 859.206586] ? __mutex_unlock_slowpath+0x157/0x750 [ 859.206611] ? kernel_write+0x623/0x660 [ 859.206647] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 859.206677] ? __fget_files+0x20d/0x3b0 [ 859.206714] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.206750] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.206794] ? ksys_write+0x1a3/0x240 [ 859.206827] ? __pfx_ksys_write+0x10/0x10 [ 859.206869] do_syscall_64+0xbf/0x3f0 [ 859.206899] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.206921] RIP: 0033:0x7f4fcedb0b19 [ 859.206937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.206957] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 859.206979] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 859.206994] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 859.207007] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.207021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.207033] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 859.207062] [ 859.239271] FAULT_INJECTION: forcing a failure. [ 859.239271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 859.240968] CPU: 0 UID: 0 PID: 15571 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 859.240998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.241011] Call Trace: [ 859.241018] [ 859.241027] dump_stack_lvl+0xfa/0x120 [ 859.241057] should_fail_ex+0x4d7/0x5e0 [ 859.241095] _copy_from_user+0x30/0xd0 [ 859.241132] copy_clone_args_from_user+0x152/0x7a0 [ 859.241159] ? find_held_lock+0x2b/0x80 [ 859.241185] ? get_pid_task+0xfd/0x250 [ 859.241213] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 859.241243] ? get_pid_task+0x107/0x250 [ 859.241271] ? proc_fail_nth_write+0x97/0x220 [ 859.241293] ? find_held_lock+0x2b/0x80 [ 859.241319] ? ksys_write+0x121/0x240 [ 859.241354] ? lock_is_held_type+0x9e/0x120 [ 859.241383] __do_sys_clone3+0xa5/0x280 [ 859.241414] ? __pfx___do_sys_clone3+0x10/0x10 [ 859.241448] ? __mutex_unlock_slowpath+0x157/0x750 [ 859.241475] ? kernel_write+0x623/0x660 [ 859.241513] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 859.241544] ? __fget_files+0x20d/0x3b0 [ 859.241584] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.241622] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.241662] ? ksys_write+0x1a3/0x240 [ 859.241697] ? __pfx_ksys_write+0x10/0x10 [ 859.241742] do_syscall_64+0xbf/0x3f0 [ 859.241781] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.241804] RIP: 0033:0x7f17f1ef4b19 [ 859.241821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.241844] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 859.241866] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 859.241881] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 859.241895] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.241910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.241924] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 859.241954] 10:55:48 executing program 1: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:48 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 10:55:48 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 10:55:48 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:48 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:55:48 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) [ 859.543565] FAULT_INJECTION: forcing a failure. [ 859.543565] name failslab, interval 1, probability 0, space 0, times 0 [ 859.545278] CPU: 0 UID: 0 PID: 15674 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 859.545310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.545324] Call Trace: [ 859.545332] [ 859.545341] dump_stack_lvl+0xfa/0x120 [ 859.545377] should_fail_ex+0x4d7/0x5e0 [ 859.545418] should_failslab+0xc2/0x120 [ 859.545458] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 859.545487] ? find_held_lock+0x2b/0x80 [ 859.545514] ? copy_process+0x3da/0x7420 [ 859.545543] ? copy_process+0x459/0x7420 [ 859.545577] ? copy_process+0x459/0x7420 [ 859.545605] copy_process+0x459/0x7420 [ 859.545633] ? __pfx__kstrtoull+0x10/0x10 [ 859.545663] ? lock_acquire+0x15e/0x2f0 [ 859.545698] ? __might_fault+0xe0/0x190 [ 859.545734] ? __pfx_copy_process+0x10/0x10 [ 859.545772] ? __might_fault+0xe0/0x190 [ 859.545808] ? _copy_from_user+0x5b/0xd0 [ 859.545847] kernel_clone+0xea/0x7f0 [ 859.545876] ? get_pid_task+0xfd/0x250 [ 859.545906] ? __pfx_kernel_clone+0x10/0x10 [ 859.545943] ? find_held_lock+0x2b/0x80 [ 859.545968] ? ksys_write+0x121/0x240 [ 859.546005] ? lock_is_held_type+0x9e/0x120 [ 859.546036] __do_sys_clone3+0x1f5/0x280 [ 859.546066] ? __pfx___do_sys_clone3+0x10/0x10 [ 859.546111] ? __fget_files+0x20d/0x3b0 [ 859.546152] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.546191] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.546231] ? ksys_write+0x1a3/0x240 [ 859.546265] ? __pfx_ksys_write+0x10/0x10 [ 859.546310] do_syscall_64+0xbf/0x3f0 [ 859.546342] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.546367] RIP: 0033:0x7f4fcedb0b19 [ 859.546385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.546407] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 859.546430] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 859.546446] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 859.546460] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.546475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.546488] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 859.546518] [ 859.546909] FAULT_INJECTION: forcing a failure. [ 859.546909] name failslab, interval 1, probability 0, space 0, times 0 [ 859.585469] CPU: 1 UID: 0 PID: 15670 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 859.585501] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.585513] Call Trace: [ 859.585528] [ 859.585536] dump_stack_lvl+0xfa/0x120 [ 859.585571] should_fail_ex+0x4d7/0x5e0 [ 859.585609] should_failslab+0xc2/0x120 [ 859.585646] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 859.585673] ? find_held_lock+0x2b/0x80 [ 859.585698] ? copy_process+0x3da/0x7420 [ 859.585724] ? copy_process+0x459/0x7420 [ 859.585757] ? copy_process+0x459/0x7420 [ 859.585788] copy_process+0x459/0x7420 [ 859.585814] ? __pfx__kstrtoull+0x10/0x10 [ 859.585843] ? lock_acquire+0x15e/0x2f0 [ 859.585874] ? __might_fault+0xe0/0x190 [ 859.585909] ? __pfx_copy_process+0x10/0x10 [ 859.585937] ? __might_fault+0xe0/0x190 [ 859.585971] ? _copy_from_user+0x5b/0xd0 [ 859.586009] kernel_clone+0xea/0x7f0 [ 859.586035] ? get_pid_task+0xfd/0x250 [ 859.586062] ? __pfx_kernel_clone+0x10/0x10 [ 859.586098] ? find_held_lock+0x2b/0x80 [ 859.586121] ? ksys_write+0x121/0x240 [ 859.586155] ? lock_is_held_type+0x9e/0x120 [ 859.586183] __do_sys_clone3+0x1f5/0x280 [ 859.586211] ? __pfx___do_sys_clone3+0x10/0x10 [ 859.586255] ? __fget_files+0x20d/0x3b0 [ 859.586294] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.586329] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 859.586366] ? ksys_write+0x1a3/0x240 [ 859.586398] ? __pfx_ksys_write+0x10/0x10 [ 859.586441] do_syscall_64+0xbf/0x3f0 [ 859.586472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.586494] RIP: 0033:0x7f17f1ef4b19 [ 859.586511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.586532] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 859.586554] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 859.586568] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 859.586581] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.586594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.586606] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 859.586637] 10:55:48 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 10:55:48 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:55:59 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 10:55:59 executing program 4: sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="380000000008010800000000000000000a0000051c000480080003514400c1ff32a22ed12716ffffff08000940fffffff80600024000f600001c36ea3cef50643b8124d20995f60b401f6d67b009d83f8540e6d6af0f091b7a74424fc8e626"], 0x38}, 0x1, 0x0, 0x0, 0x44004}, 0x80004) r0 = getpid() r1 = fork() tkill(r1, 0x31) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}) waitid(0x1, r0, &(0x7f0000000000), 0x1000001, &(0x7f0000000340)) pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x30) r3 = fork() wait4(r2, &(0x7f00000001c0), 0x4, &(0x7f00000000c0)) kcmp(r2, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) r4 = fork() r5 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/98, 0x62}], 0x1, &(0x7f0000000580)=""/147, 0x93}, 0x200) dup2(r5, r6) waitid(0x0, r4, 0x0, 0x1000000, &(0x7f0000000280)) 10:55:59 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 10:55:59 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:59 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 10:55:59 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:59 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:55:59 executing program 6: clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 870.616622] FAULT_INJECTION: forcing a failure. [ 870.616622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 870.618367] CPU: 1 UID: 0 PID: 15818 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 870.618396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.618408] Call Trace: [ 870.618415] [ 870.618423] dump_stack_lvl+0xfa/0x120 [ 870.618457] should_fail_ex+0x4d7/0x5e0 [ 870.618493] should_fail_alloc_page+0xe0/0x110 [ 870.618532] prepare_alloc_pages+0x1eb/0x550 [ 870.618566] ? __lock_acquire+0x694/0x1b70 [ 870.618601] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 870.618626] ? lock_release+0xc8/0x290 [ 870.618661] ? lock_acquire+0x15e/0x2f0 [ 870.618691] ? __memcg_slab_post_alloc_hook+0x443/0x9e0 [ 870.618722] ? find_held_lock+0x2b/0x80 [ 870.618745] ? __memcg_slab_post_alloc_hook+0x4a2/0x9e0 [ 870.618781] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 870.618815] ? __create_object+0x59/0x80 [ 870.618840] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 870.618873] ? kmem_cache_alloc_node_noprof+0x283/0x6b0 [ 870.618897] ? find_held_lock+0x2b/0x80 [ 870.618921] ? __asan_memset+0x24/0x50 [ 870.618958] __alloc_pages_noprof+0xb/0x30 [ 870.618979] copy_process+0x4e9/0x7420 [ 870.619007] ? __pfx__kstrtoull+0x10/0x10 [ 870.619034] ? lock_acquire+0x15e/0x2f0 [ 870.619064] ? __might_fault+0xe0/0x190 [ 870.619098] ? __pfx_copy_process+0x10/0x10 [ 870.619125] ? __might_fault+0xe0/0x190 [ 870.619157] ? _copy_from_user+0x5b/0xd0 [ 870.619193] kernel_clone+0xea/0x7f0 [ 870.619219] ? get_pid_task+0xfd/0x250 [ 870.619245] ? __pfx_kernel_clone+0x10/0x10 [ 870.619279] ? find_held_lock+0x2b/0x80 [ 870.619302] ? ksys_write+0x121/0x240 [ 870.619335] ? lock_is_held_type+0x9e/0x120 [ 870.619363] __do_sys_clone3+0x1f5/0x280 [ 870.619389] ? __pfx___do_sys_clone3+0x10/0x10 [ 870.619431] ? __fget_files+0x20d/0x3b0 [ 870.619468] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.619503] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.619539] ? ksys_write+0x1a3/0x240 [ 870.619570] ? __pfx_ksys_write+0x10/0x10 [ 870.619611] do_syscall_64+0xbf/0x3f0 [ 870.619640] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.619662] RIP: 0033:0x7f4fcedb0b19 [ 870.619679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.619699] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 870.619720] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 870.619734] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 870.619747] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 870.619760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 870.619772] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 870.619800] [ 870.640697] FAULT_INJECTION: forcing a failure. [ 870.640697] name failslab, interval 1, probability 0, space 0, times 0 [ 870.659991] CPU: 0 UID: 0 PID: 15819 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 870.660024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.660038] Call Trace: [ 870.660046] [ 870.660055] dump_stack_lvl+0xfa/0x120 [ 870.660095] should_fail_ex+0x4d7/0x5e0 [ 870.660137] should_failslab+0xc2/0x120 [ 870.660182] __kmalloc_noprof+0xcd/0x680 [ 870.660210] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 870.660248] ? security_prepare_creds+0x101/0x160 [ 870.660279] security_prepare_creds+0x101/0x160 [ 870.660306] prepare_creds+0x579/0x7e0 [ 870.660346] copy_creds+0x7c/0xa30 [ 870.660385] copy_process+0xf59/0x7420 [ 870.660416] ? __pfx__kstrtoull+0x10/0x10 [ 870.660455] ? __pfx_copy_process+0x10/0x10 [ 870.660485] ? __might_fault+0xe0/0x190 [ 870.660523] ? _copy_from_user+0x5b/0xd0 [ 870.660564] kernel_clone+0xea/0x7f0 [ 870.660604] ? get_pid_task+0xfd/0x250 [ 870.660634] ? __pfx_kernel_clone+0x10/0x10 [ 870.660672] ? find_held_lock+0x2b/0x80 [ 870.660699] ? ksys_write+0x121/0x240 [ 870.660737] ? lock_is_held_type+0x9e/0x120 [ 870.660774] __do_sys_clone3+0x1f5/0x280 [ 870.660804] ? __pfx___do_sys_clone3+0x10/0x10 [ 870.660850] ? __fget_files+0x20d/0x3b0 [ 870.660891] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.660930] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.660970] ? ksys_write+0x1a3/0x240 [ 870.661004] ? __pfx_ksys_write+0x10/0x10 [ 870.661049] do_syscall_64+0xbf/0x3f0 [ 870.661082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.661107] RIP: 0033:0x7f5814920b19 [ 870.661125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.661147] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 870.661171] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 870.661187] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 870.661201] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 870.661215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 870.661229] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 870.661261] 10:55:59 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 10:55:59 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) [ 870.893187] FAULT_INJECTION: forcing a failure. [ 870.893187] name failslab, interval 1, probability 0, space 0, times 0 [ 870.894897] CPU: 1 UID: 0 PID: 15929 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 870.894924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.894935] Call Trace: [ 870.894941] [ 870.894948] dump_stack_lvl+0xfa/0x120 [ 870.894978] should_fail_ex+0x4d7/0x5e0 [ 870.895010] ? prepare_creds+0x2c/0x7e0 [ 870.895038] should_failslab+0xc2/0x120 [ 870.895070] kmem_cache_alloc_noprof+0x80/0x690 [ 870.895099] ? prepare_creds+0x2c/0x7e0 [ 870.895125] prepare_creds+0x2c/0x7e0 [ 870.895157] copy_creds+0x7c/0xa30 [ 870.895188] copy_process+0xf59/0x7420 [ 870.895212] ? __pfx__kstrtoull+0x10/0x10 [ 870.895242] ? __pfx_copy_process+0x10/0x10 [ 870.895266] ? __might_fault+0xe0/0x190 [ 870.895296] ? _copy_from_user+0x5b/0xd0 [ 870.895327] kernel_clone+0xea/0x7f0 [ 870.895350] ? get_pid_task+0xfd/0x250 [ 870.895374] ? __pfx_kernel_clone+0x10/0x10 [ 870.895403] ? find_held_lock+0x2b/0x80 [ 870.895425] ? ksys_write+0x121/0x240 [ 870.895454] ? lock_is_held_type+0x9e/0x120 [ 870.895478] __do_sys_clone3+0x1f5/0x280 [ 870.895502] ? __pfx___do_sys_clone3+0x10/0x10 [ 870.895538] ? __fget_files+0x20d/0x3b0 [ 870.895570] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.895601] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.895632] ? ksys_write+0x1a3/0x240 [ 870.895660] ? __pfx_ksys_write+0x10/0x10 [ 870.895695] do_syscall_64+0xbf/0x3f0 [ 870.895722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.895741] RIP: 0033:0x7f4fcedb0b19 [ 870.895756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.895779] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 870.895799] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 870.895811] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 870.895822] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 870.895834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 870.895844] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 870.895869] [ 870.951740] FAULT_INJECTION: forcing a failure. [ 870.951740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 870.953798] CPU: 0 UID: 0 PID: 15931 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 870.953830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.953845] Call Trace: [ 870.953853] [ 870.953862] dump_stack_lvl+0xfa/0x120 [ 870.953901] should_fail_ex+0x4d7/0x5e0 [ 870.953942] should_fail_alloc_page+0xe0/0x110 [ 870.953985] prepare_alloc_pages+0x1eb/0x550 [ 870.954021] ? __lock_acquire+0x694/0x1b70 [ 870.954061] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 870.954088] ? lock_release+0xc8/0x290 [ 870.954127] ? lock_acquire+0x15e/0x2f0 [ 870.954160] ? __memcg_slab_post_alloc_hook+0x443/0x9e0 [ 870.954194] ? find_held_lock+0x2b/0x80 [ 870.954221] ? __memcg_slab_post_alloc_hook+0x4a2/0x9e0 [ 870.954254] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 870.954290] ? __create_object+0x59/0x80 [ 870.954319] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 870.954355] ? kmem_cache_alloc_node_noprof+0x283/0x6b0 [ 870.954383] ? find_held_lock+0x2b/0x80 [ 870.954409] ? __asan_memset+0x24/0x50 [ 870.954450] __alloc_pages_noprof+0xb/0x30 [ 870.954473] copy_process+0x4e9/0x7420 [ 870.954503] ? __pfx__kstrtoull+0x10/0x10 [ 870.954535] ? irqentry_exit+0x3b/0x90 [ 870.954566] ? __pfx_copy_process+0x10/0x10 [ 870.954600] ? copy_clone_args_from_user+0x57a/0x7a0 [ 870.954626] ? copy_clone_args_from_user+0x1c9/0x7a0 [ 870.954652] ? __sanitizer_cov_trace_pc+0x4b/0x80 [ 870.954682] kernel_clone+0xea/0x7f0 [ 870.954711] ? get_pid_task+0xfd/0x250 [ 870.954742] ? __pfx_kernel_clone+0x10/0x10 [ 870.954787] ? find_held_lock+0x2b/0x80 [ 870.954812] ? ksys_write+0x121/0x240 [ 870.954849] ? lock_is_held_type+0x9e/0x120 [ 870.954878] __do_sys_clone3+0x1f5/0x280 [ 870.954907] ? __pfx___do_sys_clone3+0x10/0x10 [ 870.954953] ? __fget_files+0x20d/0x3b0 [ 870.954994] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.955033] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 870.955072] ? ksys_write+0x1a3/0x240 [ 870.955107] ? __pfx_ksys_write+0x10/0x10 [ 870.955152] do_syscall_64+0xbf/0x3f0 [ 870.955185] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.955210] RIP: 0033:0x7f17f1ef4b19 [ 870.955228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.955250] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 870.955273] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 870.955289] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 870.955303] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 870.955317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 870.955331] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 870.955362] 10:56:10 executing program 6: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:10 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 10:56:10 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:10 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:10 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 10:56:10 executing program 4: r0 = getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) waitid(0x1, r1, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) r3 = fork() kcmp(r2, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:56:10 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 10:56:10 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x3, &(0x7f0000000380)=[{}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:10 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 882.095282] FAULT_INJECTION: forcing a failure. [ 882.095282] name failslab, interval 1, probability 0, space 0, times 0 [ 882.098493] CPU: 1 UID: 0 PID: 15952 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 882.098525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 882.098539] Call Trace: [ 882.098546] [ 882.098555] dump_stack_lvl+0xfa/0x120 [ 882.098590] should_fail_ex+0x4d7/0x5e0 [ 882.098629] ? prepare_creds+0x2c/0x7e0 [ 882.098663] should_failslab+0xc2/0x120 [ 882.098703] kmem_cache_alloc_noprof+0x80/0x690 [ 882.098739] ? prepare_creds+0x2c/0x7e0 [ 882.098779] prepare_creds+0x2c/0x7e0 [ 882.098816] copy_creds+0x7c/0xa30 [ 882.098855] copy_process+0xf59/0x7420 [ 882.098885] ? __pfx__kstrtoull+0x10/0x10 [ 882.098922] ? __pfx_copy_process+0x10/0x10 [ 882.098952] ? __might_fault+0xe0/0x190 [ 882.098989] ? _copy_from_user+0x5b/0xd0 [ 882.099028] kernel_clone+0xea/0x7f0 [ 882.099056] ? get_pid_task+0xfd/0x250 [ 882.099085] ? __pfx_kernel_clone+0x10/0x10 [ 882.099122] ? find_held_lock+0x2b/0x80 [ 882.099149] ? ksys_write+0x121/0x240 [ 882.099185] ? lock_is_held_type+0x9e/0x120 [ 882.099215] __do_sys_clone3+0x1f5/0x280 [ 882.099244] ? __pfx___do_sys_clone3+0x10/0x10 [ 882.099289] ? __fget_files+0x20d/0x3b0 [ 882.099330] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.099369] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.099409] ? ksys_write+0x1a3/0x240 [ 882.099444] ? __pfx_ksys_write+0x10/0x10 [ 882.099488] do_syscall_64+0xbf/0x3f0 [ 882.099520] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.099544] RIP: 0033:0x7f17f1ef4b19 [ 882.099562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 882.099584] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 882.099608] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 882.099623] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 882.099637] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 882.099651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 882.099665] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 882.099695] 10:56:11 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x0, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x0}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:11 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x109080, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0x7f, 0x9}) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x24, &(0x7f0000000080), 0x4) pidfd_getfd(r3, r4, 0x0) kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:56:11 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 10:56:11 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 10:56:11 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) [ 882.418656] FAULT_INJECTION: forcing a failure. [ 882.418656] name failslab, interval 1, probability 0, space 0, times 0 [ 882.420379] CPU: 1 UID: 0 PID: 16077 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 882.420408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 882.420420] Call Trace: [ 882.420428] [ 882.420436] dump_stack_lvl+0xfa/0x120 [ 882.420470] should_fail_ex+0x4d7/0x5e0 [ 882.420507] should_failslab+0xc2/0x120 [ 882.420545] __kmalloc_noprof+0xcd/0x680 [ 882.420569] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 882.420604] ? security_prepare_creds+0x101/0x160 [ 882.420632] security_prepare_creds+0x101/0x160 [ 882.420657] prepare_creds+0x579/0x7e0 [ 882.420693] copy_creds+0x7c/0xa30 [ 882.420744] copy_process+0xf59/0x7420 [ 882.420777] ? __pfx__kstrtoull+0x10/0x10 [ 882.420812] ? __pfx_copy_process+0x10/0x10 [ 882.420840] ? __might_fault+0xe0/0x190 [ 882.420875] ? _copy_from_user+0x5b/0xd0 [ 882.420916] kernel_clone+0xea/0x7f0 [ 882.420942] ? get_pid_task+0xfd/0x250 [ 882.420969] ? __pfx_kernel_clone+0x10/0x10 [ 882.421004] ? find_held_lock+0x2b/0x80 [ 882.421028] ? ksys_write+0x121/0x240 [ 882.421061] ? lock_is_held_type+0x9e/0x120 [ 882.421089] __do_sys_clone3+0x1f5/0x280 [ 882.421117] ? __pfx___do_sys_clone3+0x10/0x10 [ 882.421159] ? __fget_files+0x20d/0x3b0 [ 882.421197] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.421232] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.421269] ? ksys_write+0x1a3/0x240 [ 882.421301] ? __pfx_ksys_write+0x10/0x10 [ 882.421343] do_syscall_64+0xbf/0x3f0 [ 882.421373] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.421395] RIP: 0033:0x7f4fcedb0b19 [ 882.421412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 882.421432] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 882.421454] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 882.421469] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 882.421482] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 882.421495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 882.421507] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 882.421536] [ 882.471869] FAULT_INJECTION: forcing a failure. [ 882.471869] name failslab, interval 1, probability 0, space 0, times 0 [ 882.473543] CPU: 1 UID: 0 PID: 16086 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 882.473572] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 882.473584] Call Trace: [ 882.473591] [ 882.473599] dump_stack_lvl+0xfa/0x120 [ 882.473628] should_fail_ex+0x4d7/0x5e0 [ 882.473662] ? create_user_ns+0x1ea/0xd40 [ 882.473684] should_failslab+0xc2/0x120 [ 882.473719] kmem_cache_alloc_noprof+0x80/0x690 [ 882.473753] ? create_user_ns+0x1ea/0xd40 [ 882.473781] create_user_ns+0x1ea/0xd40 [ 882.473806] ? prepare_creds+0x58d/0x7e0 [ 882.473840] copy_creds+0x4a7/0xa30 [ 882.473877] copy_process+0xf59/0x7420 [ 882.473904] ? __pfx__kstrtoull+0x10/0x10 [ 882.473938] ? __pfx_copy_process+0x10/0x10 [ 882.473966] ? __might_fault+0xe0/0x190 [ 882.474000] ? _copy_from_user+0x5b/0xd0 [ 882.474036] kernel_clone+0xea/0x7f0 [ 882.474062] ? get_pid_task+0xfd/0x250 [ 882.474088] ? __pfx_kernel_clone+0x10/0x10 [ 882.474123] ? find_held_lock+0x2b/0x80 [ 882.474146] ? ksys_write+0x121/0x240 [ 882.474179] ? lock_is_held_type+0x9e/0x120 [ 882.474206] __do_sys_clone3+0x1f5/0x280 [ 882.474233] ? __pfx___do_sys_clone3+0x10/0x10 [ 882.474276] ? __fget_files+0x20d/0x3b0 [ 882.474314] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.474349] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.474385] ? ksys_write+0x1a3/0x240 [ 882.474417] ? __pfx_ksys_write+0x10/0x10 [ 882.474459] do_syscall_64+0xbf/0x3f0 [ 882.474488] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.474510] RIP: 0033:0x7f5814920b19 [ 882.474526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 882.474546] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 882.474567] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 882.474581] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 882.474594] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 882.474608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 882.474620] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 882.474649] 10:56:11 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x0, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x0}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:11 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:56:11 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 10:56:11 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) [ 882.596659] FAULT_INJECTION: forcing a failure. [ 882.596659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 882.598576] CPU: 1 UID: 0 PID: 16185 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 882.598606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 882.598619] Call Trace: [ 882.598626] [ 882.598635] dump_stack_lvl+0xfa/0x120 [ 882.598668] should_fail_ex+0x4d7/0x5e0 [ 882.598706] _copy_from_user+0x30/0xd0 [ 882.598741] copy_clone_args_from_user+0x152/0x7a0 [ 882.598775] ? find_held_lock+0x2b/0x80 [ 882.598800] ? get_pid_task+0xfd/0x250 [ 882.598828] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 882.598856] ? get_pid_task+0x107/0x250 [ 882.598881] ? proc_fail_nth_write+0x97/0x220 [ 882.598903] ? find_held_lock+0x2b/0x80 [ 882.598927] ? ksys_write+0x121/0x240 [ 882.598960] ? lock_is_held_type+0x9e/0x120 [ 882.598988] __do_sys_clone3+0xa5/0x280 [ 882.599017] ? __pfx___do_sys_clone3+0x10/0x10 [ 882.599048] ? __mutex_unlock_slowpath+0x157/0x750 [ 882.599073] ? kernel_write+0x623/0x660 [ 882.599109] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 882.599138] ? __fget_files+0x20d/0x3b0 [ 882.599176] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.599212] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 882.599249] ? ksys_write+0x1a3/0x240 [ 882.599281] ? __pfx_ksys_write+0x10/0x10 [ 882.599323] do_syscall_64+0xbf/0x3f0 [ 882.599353] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.599375] RIP: 0033:0x7fd4c7d14b19 [ 882.599392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 882.599412] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 882.599434] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 882.599449] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 882.599462] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 882.599475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 882.599488] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 882.599517] 10:56:23 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 10:56:23 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 10:56:23 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x0, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x0}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:23 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) waitid(0x1, r0, &(0x7f0000000100), 0x1000001, &(0x7f0000000280)) r1 = pidfd_open(r0, 0x0) rt_sigqueueinfo(r0, 0x39, &(0x7f0000000080)={0x3, 0x100, 0x7}) r2 = fork() tkill(r2, 0x31) r3 = fork() r4 = open_tree(0xffffffffffffffff, &(0x7f0000002cc0)='./file0\x00', 0x1) r5 = accept$inet(0xffffffffffffffff, &(0x7f0000004000)={0x2, 0x0, @dev}, &(0x7f0000004040)=0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x24, &(0x7f0000000080), 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r7, 0x6, 0x24, &(0x7f0000000080), 0x4) r8 = fork() tkill(r8, 0x31) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004680)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000000180)={0x18, 0x33, 0x1, 0x70bd28, 0x25dfdbfe, "", [@typed={0x8, 0x25, 0x0, 0x0, @pid}]}, 0x18}, {&(0x7f0000000340)={0x214, 0x22, 0x200, 0x70bd2a, 0x25dfdbfc, "", [@nested={0x1b, 0x75, 0x0, 0x1, [@generic="1fe47a27fe345718f923fad6cc402a60dd6aa4525aeb79"]}, @nested={0x8c, 0x76, 0x0, 0x1, [@typed={0x8, 0x3, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0x8, 0x26, 0x0, 0x0, @pid=r3}, @generic="fbbd1cf0a2229ce23596fd99b6c138dfe923f0ba1fb9d131664a068984ffda54", @generic="c6f05ada04f027bd364a0873f751cdd63cbd5bc57ea687720d2920c843575161a4fa1de6e570d55828baacbba111f0b45e12458df271a9f126c80a7f1bfb21144a39eff747e5f762b30aff1aacc30347fba7f56a75ae03f8"]}, @generic="ccfe37727b8482b3dcfa9908d499484e94a5684229c16b227460828ffbba06ad03e6b5525cee6b4a3dbd9c6a8ce36b181e1f7bc6a3624c688a0d8cd6cc61fcb8748f83ead8f176e10c453417b29c79e285b938c28b9dba03e9bbd07902ce11fe69ac2ba731c3e993b1008e76554debce2b3497d8d6a8efbbf4e91de8a8b544e4d00bb0d2592a988b7ce13c59622eb4159a979624179362e4fbaea1bc0e5929a965a95ded3f5e66b82d15b0418f46e5d8f57a63713dfa2aac16205b47fb9db216dba1d92bda90c5ab174c672eee", @typed={0x8, 0x4e, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x86, 0x0, 0x0, @fd}, @generic="ecaa1445241d7f7cb2f78365121fdc6fa523db49a0e1c3afb95a3343a13f2912e4c7829e4f1e9c3edcb5f6e1b4b54d953a18d1b623bc599b9d43b96f36ace8e45303d127a16603385f5d9ef2869c86b749cc7904634ffd2d17daa5d9bb533e0f4b02322ddf6be7ed7e52fa0e4c0561f8633492099d1c50baef494b639a"]}, 0x214}, {&(0x7f0000000580)={0x164, 0x27, 0x200, 0x70bd26, 0x25dfdbfb, "", [@typed={0x14, 0x61, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @generic="611249507867a8bdca2d3c046a19c8d58eee0b4ca1ff427d566dae65e623d83723635dc70bb4db4dd33d6bc88b80d576d707c494d79f0eaf3ed1fad3c0fc84471677970246c5db318143d9b40a562c4725dab677a27d633889e35aa863dc307f61867c82010ff6d5b6e771b9a6f51b206e1f06d703d8c716359a683b802b90494042655b95406abc77bbcc62b7d1454145b7b2f28e7f43c825c4b992315d42b528a00c16df51466de1bc17f3b85184abba911484cadf886cc735209ef92391bc8946364798863bc887fa07215c01afd3d7289b99a879d1b5e3be22c0c3b7c8", @typed={0x36, 0x7d, 0x0, 0x0, @binary="30b1ef16c0c9876966dac9e8d7e518b8b8182c7ae20171d60723debfd129ca6d3c0fce4f7d9d431c6cf253123954d0621406"}, @typed={0x14, 0x54, 0x0, 0x0, @ipv6=@loopback}, @typed={0x8, 0x23, 0x0, 0x0, @u32=0x20}, @typed={0xb, 0x2b, 0x0, 0x0, @str='*&-&\'&\x00'}]}, 0x164}, {&(0x7f0000000800)={0x20e0, 0x31, 0x200, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x8, 0x30, 0x0, 0x0, @fd}, @generic="f0508ec9cca558fdf3fc1e04e4f13e2b16574cbfa1d3b5523bfcd1c320d9407c05d72ef351dd6d5d25aba2372522686440384da4a150c9d596b7237aa43df1e9d6114f440deff951bc65d36c53267892f66f9facdac407c2f3c550c3a23df6", @typed={0x8, 0x86, 0x0, 0x0, @pid=r2}, @nested={0x1020, 0x55, 0x0, 0x1, [@typed={0x9, 0x94, 0x0, 0x0, @str=',*#.\x00'}, @generic="a5abc79801ae05f381b7036b02c396dbe62b5c95f356ef17f40d575bbd64e385fb16b90c522fb815eae37240785d7ba86c26389e1aa3202b9cf9204e66eb4a3c2e6031edc252528528510caa496338124c51a192a372a55a5be36b9e680a9bc82e4bde7b537257fb9fdcd190adbc6423b75557cb6fb61c98b3a4831dfb7b5635a8e73e99a20846d6ae451e55b76231d187aa9292e67121f89c1357b47136ecc2d8d28e5de890d0828de606ac5e1601739a35719fa8ba1b5394fcbfe188d0002ef9310cb9aaef3824c84de6dbe71339333180ba30ae35a77a72fa4d67044ac684ae3a1d9157b5653c423883bba0ba3e112fb8af3ec44d0ba8889d9c1157ef612645b266d9702e6967110dccd46facb1117ffc9d63ca315ff509411ede34eb9b7bf39ee475c16e38f188ca147b397d360d506853c9dba1ad5658075065938a97d078ce3a3e428d4d075840a9bd4cfea6d6d3a3468ef425579c842bdfd12222fe9fe530dbc9c203d4394fe414c2d93b6675cc5f1716df88fc29248fdcc764975d5c1f5105e124c6c428adb5696e25ba524ab830c36e13f00d34859283ceb37cdb450751c28462caf6fd9ea6a4c2418a2665a57f6504309c1935bc1c4cfe34514c13f1b29ad18ff948e51f3a54bdd585ee0412eb7038cf013cf8c69c033916e3e4fd540ac0373686649bcb4f67aa8cafedfeaad0a282d1900209dd9301585258ddb8b66caa9814d69c50b57797edcdbdc3ce796c2bf9cfdfce1542d6158ec735fc75b4bdf2818699e9c82dec7b891c4cd2a078e6fd764941272a3dfcd2497e8324f4b56dd19e25b0522258d0b6c6f504ec8b13917bb2df23de2538da5109e31b9e4b819b3b473cfa18d9548896e295b8fde4cb42c6ce1fb11ac846a740d127bdc0618b856c6945989ee60d97cf5425e040c98357ef1f8444f26122cd04d0596ff680aae91e85c166753586913ccd31ec8f2796a9e366f6072452e009440ccddc5354b083fab8778898b8128dadf9ba99750369487e0a87ac91fc8aa3584f382cba97ec5184124116d8eb3ee4f2ba9b47b56ca8e69da7a8577f01ae2304d8e17871c5d0382d8b12a21290f0e43f606f54cb78ee270b5253302a304c75591fbeceecbcff8625d5e80804966329b1fca201692ef56feda1b72e145bc27a547fd3e3d080da9678542bae7d6962c1b87304bc9454ad64ab96eb3058dac0f4e20eb5572a323e7a6aebe1488bf03305afc1b6952d1e471efe06799cef221a7266cace3034f183afb7873c58a2a2925b22794f5dcb11cade4f480bf3eff7ee5dfc63dfbcb0b898be9632add24c4aa1cc8b51cfff45ca24f07812ab1902fa6066625ff02f8c74587272a669ca407436f5cc1d4833511fb4c89ada4173b1bd47ef55119118f694546f2aa2d04cd53fb2f4117d098a7672c7b0bf98024e4a5d7ec2b3a637768cbdbe6b6aff719f551ea753e6456208dd1744353c5e282cd8cfad3de274b1bb67bd2b89f99b4c9c16496aa1322ea5add3fea76fbef5d72501ca336662c7e086febd38b6a624281bcae0ab2925e02ec0e17a517d184ae52eb85bfc631a0acbe2754bc057fdc06d88810e5258e2b0cc7825a39f69733acbaf5dcdc6489376f6b20be1db3aa0859f62641d0f95fb8317a0d0acd8802500c96482e09f65a5a0fc7451807e9c7d74f95d1548c8a523f267cc47c449137075558cf88525f3d56f6c6e4bc7655f38b50cc3f25782f648f718ed1457b61e4192578492871b76c7f3db0895dca52031df73df5abe5417447af1d1e179eb448faee7c3aef80cb7c46bed000b205ce63680fe7883d1eebb8fe492c69e2367a1d1600796f13628eb60b322b65d8e9b3feeb4e6c1e4eb5c5a379c0d27bed006a9948048dd98a0edc2f16b5b5f44c0502c82ff0baf113faf2520fd0f95f3a6a3d65d4e7ba71c7803b0020758a086b2b37f092bedf8bfa93f3bc3895e975a6473cca950f197b8cd84ab78a07eb835242ac53f5c43d046c1f67845357760e00150c9db57b4b3be26986314cf67e821ab4350d551af46cde4a257d8a95d91c8fee42a3269a55237d63caab3d94991ff863eb4ff51bde07c2b8ad4b48b04998c92e66466b151fce60ccae9c116284cdf97076ea67eeafa2625e33df01650a61a60baf4683cd362d6481b517a2336a28a793781773c80340e50c49808936b33cb2f11d4f9e1990172e337511a7f141f3bf795d9473b2b480a282bf409a8e773d5115635192f27977e2cdab16bc8b403bb1340304c64cc1e1d4b94fe40faf5d1d10c700fc5854d560d8f0162cb58739c53b1120ed6cfeed1c5c3cceaf6651036b7cbe8f0dd3157c5c76ce622b07544c65486ed6c68f6ec07e1236eb7da1d4e52b7dc94e8bb1681449a7927584025bc761d19b7f6ed03727e936950be444390486372285c9abb7f68a1c947bc62a48bd2dc8856e1ea9ff12660892e1f5a7f526e359fefb1efcb011bae43741d4bab3e107b67cc86ea0513b619f5a2c66dd8b7f8f9b8182d6f6fe26cdbc68a88dded8aa22698fc3769629ae8aa9eed3f43e1ef7e66d48da8f7ccc878b933439a077501b6fb318e498a06a48c58f5da8049326d2977f215d76c9fc0bdcf259ff2e7e4b17d507a3287158c0f8156d2441e2c5d9a967da757cfde33287a162902596a2efb01f12df2a690c4fdd127fc4a90475e1e12c0ba53e46fdd66df07eeaf2c9e181b6dc4530ad6a4c4f23cb124c61dbfbd9c03975a2f81ecb1d485a7cee65f22357c9212070916e8c6c693834a9e48564fbbaf1dc1ef154569ab8ff6971a53c59ce316fb16f1318787b33e11e1050b45c13ce63650550032db36a9f4e535a7bfd83888935f642f0d329b47dca4bbba53c30b1e11cc30a8dd9eb9d2dcb159b695d4c1d8a43c08ed7e1fb6af517d1d63313a7e52a10bc22fa00eb4d1bfe749a1198d73ef04a4898df9b4ad45a44308f7260c0e8e49e195f5fbdc028b9823de9c97717f4dc17e60bc55569ae6e2b2638f09388bcbde0a6f9ac4e8efe5ca7224be4262ff2410b429ce0b5f6836cadbc20bedd561c7300302ec872ac570b55e4d65105c7d5a0955949b1f9a26700733e2b8d4868bf17e1b882405cb5b71698bd632e674c15816d78b7ce6b9cff1d03ccd265a18074d9e8216ce9b361cd42385ac6aa1c9ec0e612fcfc5e5333a7052c38210b9d5d39be2e306cf63df4d7babf803b5818a88916c24bcbdf61fe218cd639c10c40d2bef64274820468f7636c104fdfcdf0f392937c8c31eab501c4d3b2d6f9dfa251d244bcc98a3a8fe875779993a8007bd0d5bdbf7ecadcf9135155bee06a3216cfca88ef4557858fbcf5c89196153a3641c8af5156780fa0f921c813ae94c754e6a7805d9abd02c37c376ac6d3b407c93dab163db42d8fc5ed19a84b8b168a032e065f89e5d209bd4d821690e75c980ef8c5cf8bf4c8cf22cb61e658fdf96987e85f44c1f2d003be057f596a626ca9d8503db6cb0a39eb1144db144adaa028f810b3eff6ea669b00e34e61bd39537555619f87b9128a792980744d06e16f4c8bfdbacc9b4133ea34b13425f02ef2028d44398eeecb9aa93561cff9f7115c3731d8e1fec9ca5a86ecaa48ae6b3c3be4640a03df66d3e30e60d23fa80604d534c9abf57ea27de088756df13e45580353ade3c183a3dfe202b5c3d99397ea4804144a343ab31f71f88063b29fa9095c67c59f48f08f32363aaf343ac0045d3b416af832e5626bd451eb4e16fcddaf17f2036270eb50ec72aefe2e714f4cad06d7bfbe67bbd260ae3e7b1309182cd59cbf51421e50a812b57d4491a7d6571069bd68f7dd53e8eb44769f4b74e41442b760817cb4673addb8257d6c63aa8f9362f022850e2e6db4b6786a1fa1723686cec658fa61bf3283db2c91845fec1dddf820db71d49fc7d7db0d15709bca21ed32650451ae5025d5033d8c9bc1a7541bbc4a6b4c6c2b37711be76efc7858b76a4fc373575a5f677188c623ebb75c6b3da1ed74d8e3ebf0d3cd96703e1467f2ccaee1d38a92186baecc33cc1c732d66666390b0e7a1efb410c610079d7e8913d34250bc9d5106768eeed3e6b1e098d96a05ad4a74859b7501369f2212904b1fe41b3c44fd8bbf6194569953a011d9d3d78eba43d5a72db4eb17028773a60ad2e4ad82a8857c173aad3da751cc68b7f89707a37f1bdb0d960fa8352a4a5a396c7c5a900f21973eba60eae57fb1039892b90a1c57290d0201f7e07ba1a4c73a7e43ab3c2dcdab4bd29b448c6583b7fcfd5d00d1f46f59fba5049d987a139ae0c36a75f7199131608480a6fdc88766e4c82b46ba4d63a67042f5d8b1330bf53c09b0b5849aa9032725615c2d3c3a10b333578337d427375139de0c89b9624d6485bea2f74f04609d0e8b5ce726f47b2b4952193aef9e472d59af9900e4f042634c5878e0e4ea6690bb4eb9fb71c78775aa700a84399e9c1ad0d115db8e3f504bc5055e79b74e43fc7f581fa76151baa65fe528d4d84a6c3e2d522ccbf754de5731d73b3cae15595b0d96fddcc651073df52af8c1ccecc03f36ac95be0b146c01c1550edd42c81c5a3fcc3a5779551a6e86a7bdb588320709aa8eb2c62386bde147aaab0d7ed8145dee7496deaa22f403e7851b5aea85897dac70c9bf9f7e9be4c29a1c621402bff21e5a71e22a11f9f2013d27defee6e52a5bc90736494d7b8b378f9bd836f1cad15dfb2b461da6b674cf6ca0e819a8c760dbebe9c63cddac574a022dec3235e679d5150aae1e094e5b327def7e6923a42874d9887267b2bead088bb71d9c8dee6cf26cdd259cb6a7967ef8a2e43d5115ae01d73628e7fa203edfea338ddb93ee038c599739b7358bcb7976e2d3429b3a44d03cfe8fd585c9ad730ed6fc5f7a52d7dcf985e8e87a7244cd9577fc1440050d6bc3b6f57a44ea2b01478ba56f1de336be15807c7febad457bd6f24941d853915b666b6c6a19a02a5291d402b313f1789df1281676455081c8c664fee32605c94905771e42402dc6f89507b3e066acb41aea181b8c0826947bda3d8b7def004601b69fac2c844b566e5bcd370096159f8b36be76f75cd60e34319bf2f13403dcd93e76ccfae4e124c87a98dea5c4f4a9fc20785f49f4daa9a44ad4124b8c218b8e72ad74b1b8fa11c5a874f91faa9428b91bd750f9dea786c85f460471330e2162db1e102181e2a157348d3d9d30784b0f6df4625308bd5396632207b512e527e198e3409bf4aa118a2c7e31d7a33848c02d14157440a112ff8c39b69aa697bc7765fa7ae92addce9d46866ce67ad0c04c25cf38bcf1ba849b1bdbb5340b38c407c3f11ebbd037724ada40b99785c4c2e97b1ddcbe24bff01f7b76bc4d2f421edababd1f7b44ac826903f313043c81036036e23d7f598e22f1e156c490a095d360b098233ff809f7e97aa770539a3940123c0e18f136e2d20e2c115579079fc02e4e0ce20da54e1db8df4f1acb0591f241600d10efeef8c8a9d3c583543f42a12ac5d017cdd5d99d33b0bce824fb8e4fe5f054d786abaafb5efd8773e004d4eff1b042209e7559df0654277d064c145c2c8e213bb6e806a21df81c96e654a15426f93431400f5ff755b44f544d9b9cca3cec370149ea5fdc9f69aae7557bcbad2258af8bd832fdb99eb699c64479138a19548b972180c15cc7302ab3bdfc28e297725eb722ed309a7ece99a749120ec52daf0db844379bb0e93dad8344d1daa4ffe7fae35287d222fee677d6269ff71f1850a3a599fd897a17e0f017531949ecd7172c5c8259749f7a7d86c5e283d753f8f", @typed={0x4, 0x59}, @typed={0xc, 0x7b, 0x0, 0x0, @u64=0x8}]}, @typed={0x14, 0x1f, 0x0, 0x0, @ipv6=@mcast1}, @nested={0x4, 0x2d}, @typed={0x8, 0x8b, 0x0, 0x0, @fd}, @nested={0x1020, 0x77, 0x0, 0x1, [@typed={0x8, 0x91, 0x0, 0x0, @uid}, @generic="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", @typed={0x14, 0xd, 0x0, 0x0, @ipv6=@mcast1}]}]}, 0x20e0}, {&(0x7f0000002980)={0x31c, 0x3c, 0x4, 0xffffff01, 0x25dfdbfc, "", [@generic="c7a213f31aea41f8367b5ab6484cec82b7024df8a4bfd51990a5598fc39a5959f43f55305e5064c8f77141b7d00a4214ff6e0d4f7fb99bed99b45c6cc95204b7973cb968e5c2b41159a5a328acc19811a84ee00217c1aaf4dc6763ae06228ef63d3e638be4f38b8341420801880aa359afb3c0d138a17621951f321132700789b8f34239a68c08acb6db61548fee28f7845f19c9543369446aae75522bf7b874ecc39b55d6fa9f13025a3aa24c96e4583c9aa489d18d079e452e1e455bd121109350ce9d2bfe979b", @generic="1fe86030bd0a436d", @typed={0x8, 0x31, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="84644aeaf3e376f5b34ebd9eb0e1f30bcc7244555d4ed0aa9b599684c149207f05f940c74cdecc62585dcf4c8a8a89309e8969440e15acbad5701128a9176859583b0d3140789886d091ff61efe46692f91d099dc565a4dbc0ae56355278c1b09add8253209827610bbf9865dd194852e882faf493ebd698d680ece99c67d4348670a1f8af8e3ac319668472827729eeb9b89efe5147cc105e7be0db2ab04207a92e4f6592aa1d592c34c3fc91af084ffe68cbb7b2fd4622b1686470aa86dae0dcd814f3a384bf9930e1516ef05ea0c4240d277bafb33d1dff4651c3353cbc97f5e55caa9093f843eb6c131d6050e3efb9edeceefd0fcc8193", @generic="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", @generic="b1387fa715e3735d2996d6c79ee76a04d9162fe95ff324556f921bb63b4e5a328fdc593bd8864da759d5e9c5ac8a3b11e177b5ab437467b37b436dae"]}, 0x31c}, {&(0x7f0000002d00)={0x1254, 0x24, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@generic="dbc6e78320800216ed2b9e68b6aee78da94e342b698dca8b17f79e93b492b690", @typed={0x8, 0x47, 0x0, 0x0, @fd=r4}, @typed={0xf, 0x91, 0x0, 0x0, @str='*-\xb5$-,}\x9b/@\x00'}, @nested={0x1004, 0x50, 0x0, 0x1, [@generic="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"]}, @nested={0x191, 0x5f, 0x0, 0x1, [@typed={0x14, 0x91, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @generic="19b2574846", @generic="3e9b8e5a4e4f6a1b048854f694f54168167c07bc8dcbf6e5c622eff87eeb9188db877c0819829135574bc2b29e6cb06dc07eee4f606c9d6052174e57c679a6d79d417e6690267d03f3f010b8dbbd7919725661e714bebf92fd34074dd25cb0ee138201707968b1f02eee34f08a2f1238ce5f4fab8c9f60d85a4854c822e39b699bb541a65c11b0fd666569ebb08ad0d0b077c211e0481bbe2efdd3396468f9ad10fcfb57b6ca58c761bf07f5d89914cbebed0de02e162f9b12c23b724817e0d2711e6b1480c54d", @generic="89e910144ae185da9e9ee963b60921461a040b9daf90d454145523d2263b72e96f1a887a3e10c7ed22a5e5d0f8bf67be50589c739452ab1d9c0e4680098b4501fa3e4cd97882fad7f76400e8c1bd7f23cbe9233365e12194c7cbdf6d6a42e439812810b40ddbed2f604a008671b8f95dce9d44ce90270b173e950783790f9f5a6dff90b4837bbb6253a28deb3680ca9e75ac359b5fd445be0bde4bf21fc8f11edc4739a9882485eba2274a0490"]}, @typed={0x7, 0x1d, 0x0, 0x0, @str='(\'\x00'}, @generic="e94a489c3a1265cd3c1a0b19b03aeabd773c4d60796e2d0adb2a10e698e7fa8684d3de3d53f778b89d326c51491c7c81ea1d36e73c175306ec4df9360c2844a8124e48d3a5fa1d043937a6", @generic="46e22fa4ea1b0c7fdf81bc13e56c3178f135d9c904544deb2b62297f0439"]}, 0x1254}], 0x6, &(0x7f0000004780)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000001000000", @ANYRES32=r1, @ANYRES32=r1], 0x60, 0x40080}, 0x48010) kcmp(r2, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:56:23 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 10:56:23 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 10:56:23 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 10:56:23 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 894.984627] FAULT_INJECTION: forcing a failure. [ 894.984627] name failslab, interval 1, probability 0, space 0, times 0 [ 894.986322] CPU: 0 UID: 0 PID: 16207 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 894.986352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 894.986365] Call Trace: [ 894.986373] [ 894.986381] dump_stack_lvl+0xfa/0x120 [ 894.986416] should_fail_ex+0x4d7/0x5e0 [ 894.986453] ? create_user_ns+0x1ea/0xd40 [ 894.986476] should_failslab+0xc2/0x120 [ 894.986513] kmem_cache_alloc_noprof+0x80/0x690 [ 894.986547] ? create_user_ns+0x1ea/0xd40 [ 894.986568] create_user_ns+0x1ea/0xd40 [ 894.986592] ? prepare_creds+0x58d/0x7e0 [ 894.986629] copy_creds+0x4a7/0xa30 [ 894.986665] copy_process+0xf59/0x7420 [ 894.986693] ? __pfx__kstrtoull+0x10/0x10 [ 894.986729] ? __pfx_copy_process+0x10/0x10 [ 894.986763] ? __might_fault+0xe0/0x190 [ 894.986798] ? _copy_from_user+0x5b/0xd0 [ 894.986835] kernel_clone+0xea/0x7f0 [ 894.986861] ? get_pid_task+0xfd/0x250 [ 894.986888] ? __pfx_kernel_clone+0x10/0x10 [ 894.986922] ? find_held_lock+0x2b/0x80 [ 894.986947] ? ksys_write+0x121/0x240 [ 894.986981] ? lock_is_held_type+0x9e/0x120 [ 894.987009] __do_sys_clone3+0x1f5/0x280 [ 894.987037] ? __pfx___do_sys_clone3+0x10/0x10 [ 894.987079] ? __fget_files+0x20d/0x3b0 [ 894.987116] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 894.987152] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 894.987188] ? ksys_write+0x1a3/0x240 [ 894.987221] ? __pfx_ksys_write+0x10/0x10 [ 894.987262] do_syscall_64+0xbf/0x3f0 [ 894.987292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 894.987315] RIP: 0033:0x7f4fcedb0b19 [ 894.987331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 894.987352] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 894.987374] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 894.987388] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 894.987401] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 894.987414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 894.987427] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 894.987455] [ 895.010431] FAULT_INJECTION: forcing a failure. [ 895.010431] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 895.020403] CPU: 1 UID: 0 PID: 16212 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 895.020434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 895.020447] Call Trace: [ 895.020455] [ 895.020463] dump_stack_lvl+0xfa/0x120 [ 895.020499] should_fail_ex+0x4d7/0x5e0 [ 895.020537] _copy_from_user+0x30/0xd0 [ 895.020572] copy_clone_args_from_user+0x152/0x7a0 [ 895.020600] ? find_held_lock+0x2b/0x80 [ 895.020625] ? get_pid_task+0xfd/0x250 [ 895.020654] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 895.020682] ? get_pid_task+0x107/0x250 [ 895.020708] ? proc_fail_nth_write+0x97/0x220 [ 895.020730] ? find_held_lock+0x2b/0x80 [ 895.020754] ? ksys_write+0x121/0x240 [ 895.020794] ? lock_is_held_type+0x9e/0x120 [ 895.020823] __do_sys_clone3+0xa5/0x280 [ 895.020851] ? __pfx___do_sys_clone3+0x10/0x10 [ 895.020893] ? __mutex_unlock_slowpath+0x157/0x750 [ 895.020918] ? kernel_write+0x623/0x660 [ 895.020954] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 895.020983] ? __fget_files+0x20d/0x3b0 [ 895.021021] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.021057] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.021093] ? ksys_write+0x1a3/0x240 [ 895.021126] ? __pfx_ksys_write+0x10/0x10 [ 895.021167] do_syscall_64+0xbf/0x3f0 [ 895.021197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.021220] RIP: 0033:0x7ff7debb3b19 [ 895.021237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 895.021258] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 895.021279] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 895.021294] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 895.021307] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 895.021320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.021333] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 895.021362] [ 895.030543] FAULT_INJECTION: forcing a failure. [ 895.030543] name failslab, interval 1, probability 0, space 0, times 0 [ 895.052212] CPU: 0 UID: 0 PID: 16210 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 895.052242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 895.052255] Call Trace: [ 895.052263] [ 895.052271] dump_stack_lvl+0xfa/0x120 [ 895.052302] should_fail_ex+0x4d7/0x5e0 [ 895.052339] should_failslab+0xc2/0x120 [ 895.052375] __kmalloc_noprof+0xcd/0x680 [ 895.052400] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 895.052434] ? security_prepare_creds+0x101/0x160 [ 895.052463] security_prepare_creds+0x101/0x160 [ 895.052489] prepare_creds+0x579/0x7e0 [ 895.052525] copy_creds+0x7c/0xa30 [ 895.052562] copy_process+0xf59/0x7420 [ 895.052589] ? __pfx__kstrtoull+0x10/0x10 [ 895.052625] ? __pfx_copy_process+0x10/0x10 [ 895.052653] ? __might_fault+0xe0/0x190 [ 895.052688] ? _copy_from_user+0x5b/0xd0 [ 895.052724] kernel_clone+0xea/0x7f0 [ 895.052751] ? get_pid_task+0xfd/0x250 [ 895.052785] ? __pfx_kernel_clone+0x10/0x10 [ 895.052820] ? find_held_lock+0x2b/0x80 [ 895.052844] ? ksys_write+0x121/0x240 [ 895.052887] ? lock_is_held_type+0x9e/0x120 [ 895.052915] __do_sys_clone3+0x1f5/0x280 [ 895.052942] ? __pfx___do_sys_clone3+0x10/0x10 [ 895.052985] ? __fget_files+0x20d/0x3b0 [ 895.053023] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.053059] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.053096] ? ksys_write+0x1a3/0x240 [ 895.053128] ? __pfx_ksys_write+0x10/0x10 [ 895.053170] do_syscall_64+0xbf/0x3f0 [ 895.053200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.053222] RIP: 0033:0x7f17f1ef4b19 [ 895.053239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 895.053260] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 895.053282] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 895.053297] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 895.053311] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 895.053324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.053337] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 895.053366] [ 895.086513] FAULT_INJECTION: forcing a failure. [ 895.086513] name failslab, interval 1, probability 0, space 0, times 0 [ 895.088264] CPU: 0 UID: 0 PID: 16211 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 895.088292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 895.088304] Call Trace: [ 895.088311] [ 895.088318] dump_stack_lvl+0xfa/0x120 [ 895.088346] should_fail_ex+0x4d7/0x5e0 [ 895.088381] should_failslab+0xc2/0x120 [ 895.088416] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 895.088442] ? find_held_lock+0x2b/0x80 [ 895.088465] ? copy_process+0x3da/0x7420 [ 895.088490] ? copy_process+0x459/0x7420 [ 895.088522] ? copy_process+0x459/0x7420 [ 895.088548] copy_process+0x459/0x7420 [ 895.088574] ? __pfx__kstrtoull+0x10/0x10 [ 895.088601] ? lock_acquire+0x15e/0x2f0 [ 895.088633] ? __might_fault+0xe0/0x190 [ 895.088666] ? __pfx_copy_process+0x10/0x10 [ 895.088693] ? __might_fault+0xe0/0x190 [ 895.088727] ? _copy_from_user+0x5b/0xd0 [ 895.088773] kernel_clone+0xea/0x7f0 [ 895.088801] ? get_pid_task+0xfd/0x250 [ 895.088827] ? __pfx_kernel_clone+0x10/0x10 [ 895.088872] ? find_held_lock+0x2b/0x80 [ 895.088895] ? ksys_write+0x121/0x240 [ 895.088927] ? lock_is_held_type+0x9e/0x120 [ 895.088954] __do_sys_clone3+0x1f5/0x280 [ 895.088982] ? __pfx___do_sys_clone3+0x10/0x10 [ 895.089024] ? __fget_files+0x20d/0x3b0 [ 895.089061] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.089096] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.089132] ? ksys_write+0x1a3/0x240 [ 895.089164] ? __pfx_ksys_write+0x10/0x10 [ 895.089206] do_syscall_64+0xbf/0x3f0 [ 895.089235] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.089256] RIP: 0033:0x7fd4c7d14b19 [ 895.089272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 895.089292] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 895.089313] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 895.089327] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 895.089340] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 895.089353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.089365] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 895.089394] 10:56:24 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 10:56:24 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 10:56:24 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 10:56:24 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 10:56:24 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 10:56:24 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 895.361063] FAULT_INJECTION: forcing a failure. [ 895.361063] name failslab, interval 1, probability 0, space 0, times 0 [ 895.362903] CPU: 0 UID: 0 PID: 16325 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 895.362933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 895.362945] Call Trace: [ 895.362952] [ 895.362960] dump_stack_lvl+0xfa/0x120 [ 895.362994] should_fail_ex+0x4d7/0x5e0 [ 895.363031] should_failslab+0xc2/0x120 [ 895.363068] kmem_cache_alloc_node_noprof+0x87/0x6b0 [ 895.363095] ? find_held_lock+0x2b/0x80 [ 895.363120] ? copy_process+0x3da/0x7420 [ 895.363146] ? copy_process+0x459/0x7420 [ 895.363178] ? copy_process+0x459/0x7420 [ 895.363204] copy_process+0x459/0x7420 [ 895.363230] ? __pfx__kstrtoull+0x10/0x10 [ 895.363258] ? lock_acquire+0x15e/0x2f0 [ 895.363289] ? __might_fault+0xe0/0x190 [ 895.363324] ? __pfx_copy_process+0x10/0x10 [ 895.363352] ? __might_fault+0xe0/0x190 [ 895.363385] ? _copy_from_user+0x5b/0xd0 [ 895.363422] kernel_clone+0xea/0x7f0 [ 895.363448] ? get_pid_task+0xfd/0x250 [ 895.363476] ? __pfx_kernel_clone+0x10/0x10 [ 895.363510] ? find_held_lock+0x2b/0x80 [ 895.363534] ? ksys_write+0x121/0x240 [ 895.363567] ? lock_is_held_type+0x9e/0x120 [ 895.363596] __do_sys_clone3+0x1f5/0x280 [ 895.363623] ? __pfx___do_sys_clone3+0x10/0x10 [ 895.363666] ? __fget_files+0x20d/0x3b0 [ 895.363704] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.363740] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.363783] ? ksys_write+0x1a3/0x240 [ 895.363816] ? __pfx_ksys_write+0x10/0x10 [ 895.363857] do_syscall_64+0xbf/0x3f0 [ 895.363887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.363909] RIP: 0033:0x7ff7debb3b19 [ 895.363926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:56:24 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() r2 = fork() tkill(r2, 0x31) process_vm_readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/48, 0x30}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/64, 0x40}, {&(0x7f0000000140)=""/30, 0x1e}], 0x2, 0x0) tkill(r1, 0x31) r3 = fork() kcmp(r1, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) [ 895.363946] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 895.363968] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 895.363983] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 895.363996] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 895.364009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.364022] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 895.364050] [ 895.369809] FAULT_INJECTION: forcing a failure. [ 895.369809] name failslab, interval 1, probability 0, space 0, times 0 [ 895.395920] CPU: 1 UID: 0 PID: 16326 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 895.395948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 895.395961] Call Trace: [ 895.395968] [ 895.395976] dump_stack_lvl+0xfa/0x120 [ 895.396010] should_fail_ex+0x4d7/0x5e0 [ 895.396045] should_failslab+0xc2/0x120 [ 895.396080] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 895.396112] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 895.396137] ? setup_userns_sysctls+0x51/0x190 [ 895.396169] kmemdup_noprof+0x2b/0x60 [ 895.396189] setup_userns_sysctls+0x51/0x190 [ 895.396218] create_user_ns+0x8f7/0xd40 [ 895.396247] copy_creds+0x4a7/0xa30 [ 895.396282] copy_process+0xf59/0x7420 [ 895.396308] ? __pfx__kstrtoull+0x10/0x10 [ 895.396341] ? __pfx_copy_process+0x10/0x10 [ 895.396367] ? __might_fault+0xe0/0x190 [ 895.396400] ? _copy_from_user+0x5b/0xd0 [ 895.396434] kernel_clone+0xea/0x7f0 [ 895.396459] ? get_pid_task+0xfd/0x250 [ 895.396484] ? __pfx_kernel_clone+0x10/0x10 [ 895.396517] ? find_held_lock+0x2b/0x80 [ 895.396540] ? ksys_write+0x121/0x240 [ 895.396572] ? lock_is_held_type+0x9e/0x120 [ 895.396598] __do_sys_clone3+0x1f5/0x280 [ 895.396624] ? __pfx___do_sys_clone3+0x10/0x10 [ 895.396663] ? __fget_files+0x20d/0x3b0 [ 895.396699] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.396732] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.396774] ? ksys_write+0x1a3/0x240 [ 895.396804] ? __pfx_ksys_write+0x10/0x10 [ 895.396843] do_syscall_64+0xbf/0x3f0 [ 895.396882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.396903] RIP: 0033:0x7f5814920b19 [ 895.396919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 895.396938] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 895.396959] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 895.396973] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 895.396985] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 895.396997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 895.397009] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 895.397036] 10:56:24 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 10:56:24 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 10:56:24 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:24 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) [ 895.766524] FAULT_INJECTION: forcing a failure. [ 895.766524] name failslab, interval 1, probability 0, space 0, times 0 [ 895.767860] CPU: 1 UID: 0 PID: 16444 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 895.767882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 895.767892] Call Trace: [ 895.767898] [ 895.767904] dump_stack_lvl+0xfa/0x120 [ 895.767931] should_fail_ex+0x4d7/0x5e0 [ 895.767960] should_failslab+0xc2/0x120 [ 895.767987] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 895.768013] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 895.768033] ? setup_userns_sysctls+0x51/0x190 [ 895.768058] kmemdup_noprof+0x2b/0x60 [ 895.768075] setup_userns_sysctls+0x51/0x190 [ 895.768098] create_user_ns+0x8f7/0xd40 [ 895.768120] copy_creds+0x4a7/0xa30 [ 895.768148] copy_process+0xf59/0x7420 [ 895.768169] ? __pfx__kstrtoull+0x10/0x10 [ 895.768195] ? __pfx_copy_process+0x10/0x10 [ 895.768216] ? __might_fault+0xe0/0x190 [ 895.768242] ? _copy_from_user+0x5b/0xd0 [ 895.768269] kernel_clone+0xea/0x7f0 [ 895.768289] ? get_pid_task+0xfd/0x250 [ 895.768309] ? __pfx_kernel_clone+0x10/0x10 [ 895.768335] ? find_held_lock+0x2b/0x80 [ 895.768354] ? ksys_write+0x121/0x240 [ 895.768379] ? lock_is_held_type+0x9e/0x120 [ 895.768399] __do_sys_clone3+0x1f5/0x280 [ 895.768420] ? __pfx___do_sys_clone3+0x10/0x10 [ 895.768452] ? __fget_files+0x20d/0x3b0 [ 895.768480] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.768507] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 895.768534] ? ksys_write+0x1a3/0x240 [ 895.768558] ? __pfx_ksys_write+0x10/0x10 [ 895.768588] do_syscall_64+0xbf/0x3f0 [ 895.768611] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.768628] RIP: 0033:0x7f4fcedb0b19 [ 895.768641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 895.768656] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 895.768673] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 895.768683] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 895.768693] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 895.768703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 895.768712] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 895.768733] 10:56:35 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 10:56:35 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:35 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:35 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000340), 0x1, &(0x7f00000001c0)) r1 = pidfd_open(r0, 0x0) r2 = fork() r3 = memfd_secret(0x0) syncfs(r3) gettid() fcntl$getown(r3, 0x9) r4 = fork() tkill(r4, 0x31) waitid(0x1, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)) tkill(r2, 0x31) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x2001, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x0, 0x9, 0x40, 0x0, 0x1f, 0x8000, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x6, 0x6}, 0x40205, 0x321, 0xffffffff, 0x9, 0x1ff, 0x4, 0x4, 0x0, 0x4, 0x0, 0x3}, r0, 0x3, r5, 0x1) r6 = fork() r7 = fcntl$getown(r1, 0x9) readahead(r5, 0x10001, 0x5b) ptrace$setsig(0x4203, r7, 0x1f, &(0x7f0000000080)={0x1b, 0x3}) waitid(0x2, r2, 0x0, 0x4, &(0x7f00000004c0)) kcmp(r2, r6, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:56:35 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 10:56:35 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 10:56:35 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 10:56:35 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) [ 906.373488] FAULT_INJECTION: forcing a failure. [ 906.373488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 906.375301] CPU: 1 UID: 0 PID: 16462 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 906.375328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.375341] Call Trace: [ 906.375348] [ 906.375355] dump_stack_lvl+0xfa/0x120 [ 906.375388] should_fail_ex+0x4d7/0x5e0 [ 906.375424] should_fail_alloc_page+0xe0/0x110 [ 906.375461] prepare_alloc_pages+0x1eb/0x550 [ 906.375493] ? __lock_acquire+0x694/0x1b70 [ 906.375528] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 906.375551] ? lock_release+0xc8/0x290 [ 906.375585] ? lock_acquire+0x15e/0x2f0 [ 906.375614] ? __memcg_slab_post_alloc_hook+0x443/0x9e0 [ 906.375644] ? find_held_lock+0x2b/0x80 [ 906.375666] ? __memcg_slab_post_alloc_hook+0x4a2/0x9e0 [ 906.375695] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 906.375728] ? __create_object+0x59/0x80 [ 906.375752] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 906.375791] ? kmem_cache_alloc_node_noprof+0x283/0x6b0 [ 906.375814] ? find_held_lock+0x2b/0x80 [ 906.375837] ? __asan_memset+0x24/0x50 [ 906.375873] __alloc_pages_noprof+0xb/0x30 [ 906.375893] copy_process+0x4e9/0x7420 [ 906.375920] ? __pfx__kstrtoull+0x10/0x10 [ 906.375946] ? lock_acquire+0x15e/0x2f0 [ 906.375976] ? __might_fault+0xe0/0x190 [ 906.376008] ? __pfx_copy_process+0x10/0x10 [ 906.376034] ? __might_fault+0xe0/0x190 [ 906.376066] ? _copy_from_user+0x5b/0xd0 [ 906.376101] kernel_clone+0xea/0x7f0 [ 906.376125] ? get_pid_task+0xfd/0x250 [ 906.376151] ? __pfx_kernel_clone+0x10/0x10 [ 906.376184] ? find_held_lock+0x2b/0x80 [ 906.376207] ? ksys_write+0x121/0x240 [ 906.376239] ? lock_is_held_type+0x9e/0x120 [ 906.376265] __do_sys_clone3+0x1f5/0x280 [ 906.376292] ? __pfx___do_sys_clone3+0x10/0x10 [ 906.376332] ? __fget_files+0x20d/0x3b0 [ 906.376368] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.376402] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.376437] ? ksys_write+0x1a3/0x240 [ 906.376467] ? __pfx_ksys_write+0x10/0x10 [ 906.376506] do_syscall_64+0xbf/0x3f0 [ 906.376535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.376556] RIP: 0033:0x7ff7debb3b19 [ 906.376573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.376592] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 906.376613] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 906.376627] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 906.376640] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.376652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 906.376664] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 906.376691] [ 906.417997] FAULT_INJECTION: forcing a failure. [ 906.417997] name failslab, interval 1, probability 0, space 0, times 0 [ 906.419514] CPU: 1 UID: 0 PID: 16464 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 906.419541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.419552] Call Trace: [ 906.419558] [ 906.419566] dump_stack_lvl+0xfa/0x120 [ 906.419593] should_fail_ex+0x4d7/0x5e0 [ 906.419625] ? create_user_ns+0x1ea/0xd40 [ 906.419645] should_failslab+0xc2/0x120 [ 906.419678] kmem_cache_alloc_noprof+0x80/0x690 [ 906.419710] ? create_user_ns+0x1ea/0xd40 [ 906.419730] create_user_ns+0x1ea/0xd40 [ 906.419752] ? prepare_creds+0x58d/0x7e0 [ 906.419792] copy_creds+0x4a7/0xa30 [ 906.419827] copy_process+0xf59/0x7420 [ 906.419852] ? __pfx__kstrtoull+0x10/0x10 [ 906.419885] ? __pfx_copy_process+0x10/0x10 [ 906.419910] ? __might_fault+0xe0/0x190 [ 906.419942] ? _copy_from_user+0x5b/0xd0 [ 906.419976] kernel_clone+0xea/0x7f0 [ 906.420001] ? get_pid_task+0xfd/0x250 [ 906.420026] ? __pfx_kernel_clone+0x10/0x10 [ 906.420058] ? find_held_lock+0x2b/0x80 [ 906.420080] ? ksys_write+0x121/0x240 [ 906.420111] ? lock_is_held_type+0x9e/0x120 [ 906.420137] __do_sys_clone3+0x1f5/0x280 [ 906.420163] ? __pfx___do_sys_clone3+0x10/0x10 [ 906.420203] ? __fget_files+0x20d/0x3b0 [ 906.420238] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.420271] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.420305] ? ksys_write+0x1a3/0x240 [ 906.420335] ? __pfx_ksys_write+0x10/0x10 [ 906.420375] do_syscall_64+0xbf/0x3f0 [ 906.420402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.420422] RIP: 0033:0x7f17f1ef4b19 [ 906.420438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.420456] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 906.420476] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 906.420489] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 906.420501] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.420513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 906.420525] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 906.420552] [ 906.455640] FAULT_INJECTION: forcing a failure. [ 906.455640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 906.457617] CPU: 0 UID: 0 PID: 16467 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 906.457648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.457661] Call Trace: [ 906.457668] [ 906.457677] dump_stack_lvl+0xfa/0x120 [ 906.457708] should_fail_ex+0x4d7/0x5e0 [ 906.457747] should_fail_alloc_page+0xe0/0x110 [ 906.457795] prepare_alloc_pages+0x1eb/0x550 [ 906.457832] ? __lock_acquire+0x694/0x1b70 [ 906.457870] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 906.457897] ? lock_release+0xc8/0x290 [ 906.457936] ? lock_acquire+0x15e/0x2f0 [ 906.457970] ? __memcg_slab_post_alloc_hook+0x443/0x9e0 [ 906.458004] ? find_held_lock+0x2b/0x80 [ 906.458030] ? __memcg_slab_post_alloc_hook+0x4a2/0x9e0 [ 906.458064] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 906.458101] ? __create_object+0x59/0x80 [ 906.458129] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 906.458166] ? kmem_cache_alloc_node_noprof+0x283/0x6b0 [ 906.458194] ? find_held_lock+0x2b/0x80 [ 906.458220] ? __asan_memset+0x24/0x50 [ 906.458262] __alloc_pages_noprof+0xb/0x30 [ 906.458286] copy_process+0x4e9/0x7420 [ 906.458315] ? __pfx__kstrtoull+0x10/0x10 [ 906.458345] ? lock_acquire+0x15e/0x2f0 [ 906.458379] ? __might_fault+0xe0/0x190 [ 906.458415] ? __pfx_copy_process+0x10/0x10 [ 906.458446] ? __might_fault+0xe0/0x190 [ 906.458483] ? _copy_from_user+0x5b/0xd0 [ 906.458523] kernel_clone+0xea/0x7f0 [ 906.458551] ? get_pid_task+0xfd/0x250 [ 906.458580] ? __pfx_kernel_clone+0x10/0x10 [ 906.458619] ? find_held_lock+0x2b/0x80 [ 906.458644] ? ksys_write+0x121/0x240 [ 906.458680] ? lock_is_held_type+0x9e/0x120 [ 906.458710] __do_sys_clone3+0x1f5/0x280 [ 906.458740] ? __pfx___do_sys_clone3+0x10/0x10 [ 906.458787] ? __fget_files+0x20d/0x3b0 [ 906.458828] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.458866] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.458906] ? ksys_write+0x1a3/0x240 [ 906.458942] ? __pfx_ksys_write+0x10/0x10 [ 906.458987] do_syscall_64+0xbf/0x3f0 [ 906.459020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.459043] RIP: 0033:0x7fd4c7d14b19 [ 906.459061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.459083] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 906.459106] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 906.459122] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 906.459136] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.459150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 906.459164] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 906.459198] [ 906.532547] FAULT_INJECTION: forcing a failure. [ 906.532547] name failslab, interval 1, probability 0, space 0, times 0 [ 906.534589] CPU: 0 UID: 0 PID: 16471 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 906.534624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.534639] Call Trace: [ 906.534647] [ 906.534656] dump_stack_lvl+0xfa/0x120 [ 906.534694] should_fail_ex+0x4d7/0x5e0 [ 906.534738] should_failslab+0xc2/0x120 [ 906.534789] __kmalloc_noprof+0xcd/0x680 [ 906.534816] ? __create_object+0x59/0x80 [ 906.534845] ? __register_sysctl_table+0xb5/0x16a0 [ 906.534887] __register_sysctl_table+0xb5/0x16a0 [ 906.534920] ? kasan_save_track+0x14/0x30 [ 906.534964] ? __kasan_kmalloc+0x7f/0x90 [ 906.535011] ? __pfx___register_sysctl_table+0x10/0x10 [ 906.535044] ? setup_userns_sysctls+0x51/0x190 [ 906.535081] ? __asan_memcpy+0x3d/0x60 [ 906.535123] setup_userns_sysctls+0xcb/0x190 [ 906.535159] create_user_ns+0x8f7/0xd40 [ 906.535194] copy_creds+0x4a7/0xa30 [ 906.535238] copy_process+0xf59/0x7420 [ 906.535270] ? __pfx__kstrtoull+0x10/0x10 [ 906.535311] ? __pfx_copy_process+0x10/0x10 [ 906.535344] ? __might_fault+0xe0/0x190 [ 906.535385] ? _copy_from_user+0x5b/0xd0 [ 906.535428] kernel_clone+0xea/0x7f0 [ 906.535459] ? get_pid_task+0xfd/0x250 [ 906.535491] ? __pfx_kernel_clone+0x10/0x10 [ 906.535532] ? find_held_lock+0x2b/0x80 [ 906.535561] ? ksys_write+0x121/0x240 [ 906.535601] ? lock_is_held_type+0x9e/0x120 [ 906.535634] __do_sys_clone3+0x1f5/0x280 [ 906.535667] ? __pfx___do_sys_clone3+0x10/0x10 [ 906.535716] ? __fget_files+0x20d/0x3b0 [ 906.535760] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.535803] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.535847] ? ksys_write+0x1a3/0x240 [ 906.535885] ? __pfx_ksys_write+0x10/0x10 [ 906.535934] do_syscall_64+0xbf/0x3f0 [ 906.535969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.535995] RIP: 0033:0x7f5814920b19 [ 906.536015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.536039] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 906.536065] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 906.536082] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 906.536098] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.536113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.536128] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 906.536161] 10:56:35 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 10:56:35 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 10:56:35 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 10:56:35 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:35 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) [ 906.812185] FAULT_INJECTION: forcing a failure. [ 906.812185] name failslab, interval 1, probability 0, space 0, times 0 [ 906.813521] CPU: 1 UID: 0 PID: 16584 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 906.813543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.813552] Call Trace: [ 906.813557] [ 906.813563] dump_stack_lvl+0xfa/0x120 [ 906.813589] should_fail_ex+0x4d7/0x5e0 [ 906.813617] ? prepare_creds+0x2c/0x7e0 [ 906.813641] should_failslab+0xc2/0x120 [ 906.813668] kmem_cache_alloc_noprof+0x80/0x690 [ 906.813693] ? prepare_creds+0x2c/0x7e0 [ 906.813715] prepare_creds+0x2c/0x7e0 [ 906.813740] copy_creds+0x7c/0xa30 [ 906.813772] copy_process+0xf59/0x7420 [ 906.813792] ? __pfx__kstrtoull+0x10/0x10 [ 906.813822] ? __pfx_copy_process+0x10/0x10 [ 906.813842] ? __might_fault+0xe0/0x190 [ 906.813868] ? _copy_from_user+0x5b/0xd0 [ 906.813894] kernel_clone+0xea/0x7f0 [ 906.813914] ? get_pid_task+0xfd/0x250 [ 906.813934] ? __pfx_kernel_clone+0x10/0x10 [ 906.813959] ? find_held_lock+0x2b/0x80 [ 906.813977] ? ksys_write+0x121/0x240 [ 906.814002] ? lock_is_held_type+0x9e/0x120 [ 906.814023] __do_sys_clone3+0x1f5/0x280 [ 906.814043] ? __pfx___do_sys_clone3+0x10/0x10 [ 906.814074] ? __fget_files+0x20d/0x3b0 [ 906.814102] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.814128] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.814155] ? ksys_write+0x1a3/0x240 [ 906.814178] ? __pfx_ksys_write+0x10/0x10 [ 906.814208] do_syscall_64+0xbf/0x3f0 [ 906.814230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.814247] RIP: 0033:0x7ff7debb3b19 10:56:35 executing program 4: r0 = getpid() r1 = fork() tkill(r1, 0x31) r2 = pidfd_open(r1, 0x0) waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r3 = getpid() ptrace$peekuser(0x3, r3, 0x7) clone3(&(0x7f0000000400)={0x10080a00, &(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100), {0x35}, &(0x7f00000007c0)=""/185, 0xb9, &(0x7f0000000340)=""/161, &(0x7f0000000140)=[r0, r0], 0x2}, 0x58) clone3(&(0x7f0000000680)={0x200002000, &(0x7f0000000180)=0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0), {0x39}, &(0x7f0000000500)=""/40, 0x28, &(0x7f0000000540)=""/213, &(0x7f0000000640)=[r0, r0, r0], 0x3}, 0x58) pidfd_open(r4, 0x0) r6 = fork() r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r7, 0x6, 0x24, &(0x7f0000000080), 0x4) pidfd_getfd(r2, r7, 0x0) pread64(r5, &(0x7f0000000700)=""/147, 0x93, 0x10000) r8 = fork() kcmp(r6, r8, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) [ 906.814259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.814274] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 906.814291] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 906.814301] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 906.814311] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.814320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 906.814330] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 906.814351] [ 906.823555] FAULT_INJECTION: forcing a failure. [ 906.823555] name failslab, interval 1, probability 0, space 0, times 0 [ 906.846216] CPU: 0 UID: 0 PID: 16586 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 906.846249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.846262] Call Trace: [ 906.846270] [ 906.846279] dump_stack_lvl+0xfa/0x120 [ 906.846314] should_fail_ex+0x4d7/0x5e0 [ 906.846351] ? prepare_creds+0x2c/0x7e0 [ 906.846385] should_failslab+0xc2/0x120 [ 906.846423] kmem_cache_alloc_noprof+0x80/0x690 [ 906.846459] ? prepare_creds+0x2c/0x7e0 [ 906.846491] prepare_creds+0x2c/0x7e0 [ 906.846528] copy_creds+0x7c/0xa30 [ 906.846567] copy_process+0xf59/0x7420 [ 906.846596] ? __pfx__kstrtoull+0x10/0x10 [ 906.846633] ? __pfx_copy_process+0x10/0x10 [ 906.846663] ? __might_fault+0xe0/0x190 [ 906.846699] ? _copy_from_user+0x5b/0xd0 [ 906.846739] kernel_clone+0xea/0x7f0 [ 906.846774] ? get_pid_task+0xfd/0x250 [ 906.846802] ? __pfx_kernel_clone+0x10/0x10 [ 906.846839] ? find_held_lock+0x2b/0x80 [ 906.846864] ? ksys_write+0x121/0x240 [ 906.846899] ? lock_is_held_type+0x9e/0x120 [ 906.846930] __do_sys_clone3+0x1f5/0x280 [ 906.846959] ? __pfx___do_sys_clone3+0x10/0x10 [ 906.847005] ? __fget_files+0x20d/0x3b0 [ 906.847044] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.847081] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 906.847120] ? ksys_write+0x1a3/0x240 [ 906.847154] ? __pfx_ksys_write+0x10/0x10 [ 906.847198] do_syscall_64+0xbf/0x3f0 [ 906.847229] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.847252] RIP: 0033:0x7fd4c7d14b19 [ 906.847270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.847291] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 906.847315] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 906.847330] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 906.847344] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.847357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 906.847371] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 906.847401] 10:56:35 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 10:56:35 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) [ 907.050481] FAULT_INJECTION: forcing a failure. [ 907.050481] name failslab, interval 1, probability 0, space 0, times 0 [ 907.051699] CPU: 1 UID: 0 PID: 16616 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 907.051717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 907.051725] Call Trace: [ 907.051730] [ 907.051735] dump_stack_lvl+0xfa/0x120 [ 907.051763] should_fail_ex+0x4d7/0x5e0 [ 907.051787] should_failslab+0xc2/0x120 [ 907.051811] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 907.051832] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 907.051849] ? setup_userns_sysctls+0x51/0x190 [ 907.051870] kmemdup_noprof+0x2b/0x60 [ 907.051884] setup_userns_sysctls+0x51/0x190 [ 907.051903] create_user_ns+0x8f7/0xd40 [ 907.051922] copy_creds+0x4a7/0xa30 [ 907.051945] copy_process+0xf59/0x7420 [ 907.051962] ? __pfx__kstrtoull+0x10/0x10 [ 907.051984] ? __pfx_copy_process+0x10/0x10 [ 907.052001] ? __might_fault+0xe0/0x190 [ 907.052022] ? _copy_from_user+0x5b/0xd0 [ 907.052044] kernel_clone+0xea/0x7f0 [ 907.052061] ? get_pid_task+0xfd/0x250 [ 907.052078] ? __pfx_kernel_clone+0x10/0x10 [ 907.052099] ? find_held_lock+0x2b/0x80 [ 907.052115] ? ksys_write+0x121/0x240 [ 907.052136] ? lock_is_held_type+0x9e/0x120 [ 907.052153] __do_sys_clone3+0x1f5/0x280 [ 907.052169] ? __pfx___do_sys_clone3+0x10/0x10 [ 907.052195] ? __fget_files+0x20d/0x3b0 [ 907.052219] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 907.052241] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 907.052263] ? ksys_write+0x1a3/0x240 [ 907.052283] ? __pfx_ksys_write+0x10/0x10 [ 907.052308] do_syscall_64+0xbf/0x3f0 [ 907.052327] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 907.052341] RIP: 0033:0x7f17f1ef4b19 [ 907.052351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 907.052364] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 907.052378] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 907.052387] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 907.052395] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 907.052403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 907.052411] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 907.052428] 10:56:35 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:35 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 10:56:36 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 10:56:36 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 10:56:46 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 10:56:46 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 10:56:46 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:46 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 10:56:46 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) r3 = fork() kcmp(r2, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) r4 = gettid() kcmp(r0, r4, 0x4, r1, r1) 10:56:46 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 10:56:46 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 10:56:46 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 917.287980] FAULT_INJECTION: forcing a failure. [ 917.287980] name failslab, interval 1, probability 0, space 0, times 0 [ 917.290024] CPU: 1 UID: 0 PID: 16722 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 917.290059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.290074] Call Trace: [ 917.290083] [ 917.290093] dump_stack_lvl+0xfa/0x120 [ 917.290133] should_fail_ex+0x4d7/0x5e0 [ 917.290177] should_failslab+0xc2/0x120 [ 917.290221] __kmalloc_noprof+0xcd/0x680 [ 917.290248] ? __register_sysctl_table+0xd3e/0x16a0 [ 917.290285] ? lock_release+0xc8/0x290 [ 917.290323] ? __register_sysctl_table+0xd4f/0x16a0 [ 917.290364] __register_sysctl_table+0xd4f/0x16a0 [ 917.290407] ? __pfx___register_sysctl_table+0x10/0x10 [ 917.290441] ? setup_userns_sysctls+0x51/0x190 [ 917.290478] ? __asan_memcpy+0x3d/0x60 [ 917.290522] setup_userns_sysctls+0xcb/0x190 [ 917.290559] create_user_ns+0x8f7/0xd40 [ 917.290595] copy_creds+0x4a7/0xa30 [ 917.290639] copy_process+0xf59/0x7420 [ 917.290672] ? __pfx__kstrtoull+0x10/0x10 [ 917.290714] ? __pfx_copy_process+0x10/0x10 [ 917.290747] ? __might_fault+0xe0/0x190 [ 917.290798] ? _copy_from_user+0x5b/0xd0 [ 917.290842] kernel_clone+0xea/0x7f0 [ 917.290873] ? get_pid_task+0xfd/0x250 [ 917.290906] ? __pfx_kernel_clone+0x10/0x10 [ 917.290948] ? find_held_lock+0x2b/0x80 [ 917.290976] ? ksys_write+0x121/0x240 [ 917.291016] ? lock_is_held_type+0x9e/0x120 [ 917.291050] __do_sys_clone3+0x1f5/0x280 [ 917.291083] ? __pfx___do_sys_clone3+0x10/0x10 [ 917.291134] ? __fget_files+0x20d/0x3b0 [ 917.291179] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.291222] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.291266] ? ksys_write+0x1a3/0x240 [ 917.291305] ? __pfx_ksys_write+0x10/0x10 [ 917.291355] do_syscall_64+0xbf/0x3f0 [ 917.291391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.291417] RIP: 0033:0x7f5814920b19 [ 917.291438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.291462] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 917.291488] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 917.291505] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 917.291521] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.291537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.291552] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 917.291586] [ 917.334033] sysctl could not get directory: / [ 917.334132] FAULT_INJECTION: forcing a failure. [ 917.334132] name failslab, interval 1, probability 0, space 0, times 0 [ 917.334165] CPU: 0 UID: 0 PID: 16727 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 917.334182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.334190] Call Trace: [ 917.334194] [ 917.334199] dump_stack_lvl+0xfa/0x120 [ 917.334223] should_fail_ex+0x4d7/0x5e0 [ 917.334245] should_failslab+0xc2/0x120 [ 917.334268] __kmalloc_noprof+0xcd/0x680 [ 917.334283] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 917.334303] ? security_prepare_creds+0x101/0x160 [ 917.334319] security_prepare_creds+0x101/0x160 [ 917.334333] prepare_creds+0x579/0x7e0 [ 917.334355] copy_creds+0x7c/0xa30 [ 917.334375] copy_process+0xf59/0x7420 [ 917.334391] ? __pfx__kstrtoull+0x10/0x10 [ 917.334412] ? __pfx_copy_process+0x10/0x10 [ 917.334427] ? __might_fault+0xe0/0x190 [ 917.334447] ? _copy_from_user+0x5b/0xd0 [ 917.334467] kernel_clone+0xea/0x7f0 [ 917.334482] ? get_pid_task+0xfd/0x250 [ 917.334498] ? __pfx_kernel_clone+0x10/0x10 [ 917.334517] ? find_held_lock+0x2b/0x80 [ 917.334532] ? ksys_write+0x121/0x240 [ 917.334552] ? lock_is_held_type+0x9e/0x120 [ 917.334568] __do_sys_clone3+0x1f5/0x280 [ 917.334583] ? __pfx___do_sys_clone3+0x10/0x10 [ 917.334606] ? __fget_files+0x20d/0x3b0 [ 917.334627] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.334648] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.334668] ? ksys_write+0x1a3/0x240 [ 917.334685] ? __pfx_ksys_write+0x10/0x10 [ 917.334708] do_syscall_64+0xbf/0x3f0 [ 917.334725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.334738] RIP: 0033:0x7fd4c7d14b19 [ 917.334747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.334763] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 917.334776] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 917.334784] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 917.334791] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.334798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.334805] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 917.334821] [ 917.369045] user -12 10:56:46 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) [ 917.388393] FAULT_INJECTION: forcing a failure. [ 917.388393] name failslab, interval 1, probability 0, space 0, times 0 [ 917.389551] CPU: 0 UID: 0 PID: 16737 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 917.389568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.389575] Call Trace: [ 917.389578] [ 917.389583] dump_stack_lvl+0xfa/0x120 [ 917.389588] FAULT_INJECTION: forcing a failure. [ 917.389588] name failslab, interval 1, probability 0, space 0, times 0 [ 917.389601] should_fail_ex+0x4d7/0x5e0 [ 917.389623] should_failslab+0xc2/0x120 [ 917.389645] __kmalloc_noprof+0xcd/0x680 [ 917.389658] ? __create_object+0x59/0x80 [ 917.389673] ? __register_sysctl_table+0xb5/0x16a0 [ 917.389693] __register_sysctl_table+0xb5/0x16a0 [ 917.389709] ? kasan_save_track+0x14/0x30 [ 917.389729] ? __kasan_kmalloc+0x7f/0x90 [ 917.389751] ? __pfx___register_sysctl_table+0x10/0x10 [ 917.389771] ? setup_userns_sysctls+0x51/0x190 [ 917.389789] ? __asan_memcpy+0x3d/0x60 [ 917.389809] setup_userns_sysctls+0xcb/0x190 [ 917.389826] create_user_ns+0x8f7/0xd40 [ 917.389844] copy_creds+0x4a7/0xa30 [ 917.389864] copy_process+0xf59/0x7420 [ 917.389879] ? __pfx__kstrtoull+0x10/0x10 [ 917.389898] ? __pfx_copy_process+0x10/0x10 [ 917.389913] ? __might_fault+0xe0/0x190 [ 917.389933] ? _copy_from_user+0x5b/0xd0 [ 917.389953] kernel_clone+0xea/0x7f0 [ 917.389968] ? get_pid_task+0xfd/0x250 [ 917.389983] ? __pfx_kernel_clone+0x10/0x10 [ 917.390002] ? find_held_lock+0x2b/0x80 [ 917.390015] ? ksys_write+0x121/0x240 [ 917.390033] ? lock_is_held_type+0x9e/0x120 [ 917.390049] __do_sys_clone3+0x1f5/0x280 [ 917.390064] ? __pfx___do_sys_clone3+0x10/0x10 [ 917.390087] ? __fget_files+0x20d/0x3b0 [ 917.390108] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.390128] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.390148] ? ksys_write+0x1a3/0x240 [ 917.390165] ? __pfx_ksys_write+0x10/0x10 [ 917.390188] do_syscall_64+0xbf/0x3f0 [ 917.390204] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.390216] RIP: 0033:0x7f17f1ef4b19 [ 917.390225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.390237] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 917.390249] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 917.390257] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 917.390265] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.390272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.390279] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 917.390295] [ 917.430085] CPU: 1 UID: 0 PID: 16726 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 917.430118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.430131] Call Trace: [ 917.430139] [ 917.430147] dump_stack_lvl+0xfa/0x120 [ 917.430183] should_fail_ex+0x4d7/0x5e0 [ 917.430221] should_failslab+0xc2/0x120 [ 917.430258] __kmalloc_noprof+0xcd/0x680 [ 917.430283] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 917.430318] ? security_prepare_creds+0x101/0x160 [ 917.430346] security_prepare_creds+0x101/0x160 [ 917.430372] prepare_creds+0x579/0x7e0 [ 917.430409] copy_creds+0x7c/0xa30 [ 917.430445] copy_process+0xf59/0x7420 [ 917.430473] ? __pfx__kstrtoull+0x10/0x10 [ 917.430509] ? __pfx_copy_process+0x10/0x10 [ 917.430537] ? __might_fault+0xe0/0x190 [ 917.430572] ? _copy_from_user+0x5b/0xd0 [ 917.430609] kernel_clone+0xea/0x7f0 [ 917.430635] ? get_pid_task+0xfd/0x250 [ 917.430663] ? __pfx_kernel_clone+0x10/0x10 [ 917.430698] ? find_held_lock+0x2b/0x80 [ 917.430722] ? ksys_write+0x121/0x240 [ 917.430762] ? lock_is_held_type+0x9e/0x120 [ 917.430791] __do_sys_clone3+0x1f5/0x280 [ 917.430819] ? __pfx___do_sys_clone3+0x10/0x10 [ 917.430861] ? __fget_files+0x20d/0x3b0 [ 917.430899] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.430935] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.430972] ? ksys_write+0x1a3/0x240 [ 917.431004] ? __pfx_ksys_write+0x10/0x10 [ 917.431046] do_syscall_64+0xbf/0x3f0 [ 917.431076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.431099] RIP: 0033:0x7ff7debb3b19 [ 917.431117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.431137] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 917.431160] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 917.431174] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 917.431187] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.431200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.431213] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 917.431242] 10:56:46 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 10:56:46 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 10:56:46 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) [ 917.561949] FAULT_INJECTION: forcing a failure. [ 917.561949] name failslab, interval 1, probability 0, space 0, times 0 [ 917.563951] CPU: 1 UID: 0 PID: 16770 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 917.563982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.563994] Call Trace: [ 917.564002] [ 917.564010] dump_stack_lvl+0xfa/0x120 [ 917.564044] should_fail_ex+0x4d7/0x5e0 [ 917.564083] ? create_user_ns+0x1ea/0xd40 [ 917.564105] should_failslab+0xc2/0x120 [ 917.564146] kmem_cache_alloc_noprof+0x80/0x690 [ 917.564180] ? create_user_ns+0x1ea/0xd40 [ 917.564201] create_user_ns+0x1ea/0xd40 [ 917.564225] ? prepare_creds+0x58d/0x7e0 [ 917.564268] copy_creds+0x4a7/0xa30 [ 917.564306] copy_process+0xf59/0x7420 [ 917.564334] ? __pfx__kstrtoull+0x10/0x10 [ 917.564370] ? __pfx_copy_process+0x10/0x10 [ 917.564400] ? __might_fault+0xe0/0x190 [ 917.564435] ? _copy_from_user+0x5b/0xd0 [ 917.564472] kernel_clone+0xea/0x7f0 [ 917.564498] ? get_pid_task+0xfd/0x250 [ 917.564526] ? __pfx_kernel_clone+0x10/0x10 [ 917.564561] ? find_held_lock+0x2b/0x80 [ 917.564588] ? ksys_write+0x121/0x240 [ 917.564624] ? lock_is_held_type+0x9e/0x120 [ 917.564652] __do_sys_clone3+0x1f5/0x280 [ 917.564681] ? __pfx___do_sys_clone3+0x10/0x10 [ 917.564732] ? __fget_files+0x20d/0x3b0 [ 917.564780] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.564819] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.564857] ? ksys_write+0x1a3/0x240 [ 917.564889] ? xfd_validate_state+0x55/0x180 [ 917.564922] ? __pfx_ksys_write+0x10/0x10 [ 917.564967] do_syscall_64+0xbf/0x3f0 [ 917.564999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.565022] RIP: 0033:0x7fd4c7d14b19 [ 917.565040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.565062] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 917.565084] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 917.565113] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 917.565126] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.565139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.565153] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 917.565184] 10:56:46 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:46 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 10:56:46 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 10:56:46 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:46 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 10:56:46 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) [ 917.761968] FAULT_INJECTION: forcing a failure. [ 917.761968] name failslab, interval 1, probability 0, space 0, times 0 [ 917.763947] CPU: 1 UID: 0 PID: 16857 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 917.763977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.763990] Call Trace: [ 917.763998] [ 917.764006] dump_stack_lvl+0xfa/0x120 [ 917.764040] should_fail_ex+0x4d7/0x5e0 [ 917.764078] should_failslab+0xc2/0x120 [ 917.764115] __kmalloc_noprof+0xcd/0x680 [ 917.764138] ? __register_sysctl_table+0xd3e/0x16a0 [ 917.764169] ? lock_release+0xc8/0x290 [ 917.764201] ? __register_sysctl_table+0xd4f/0x16a0 [ 917.764235] __register_sysctl_table+0xd4f/0x16a0 [ 917.764270] ? __pfx___register_sysctl_table+0x10/0x10 [ 917.764299] ? setup_userns_sysctls+0x51/0x190 [ 917.764330] ? __asan_memcpy+0x3d/0x60 [ 917.764367] setup_userns_sysctls+0xcb/0x190 [ 917.764397] create_user_ns+0x8f7/0xd40 [ 917.764427] copy_creds+0x4a7/0xa30 [ 917.764465] copy_process+0xf59/0x7420 [ 917.764492] ? __pfx__kstrtoull+0x10/0x10 [ 917.764528] ? __pfx_copy_process+0x10/0x10 [ 917.764555] ? __might_fault+0xe0/0x190 [ 917.764591] ? _copy_from_user+0x5b/0xd0 [ 917.764627] kernel_clone+0xea/0x7f0 [ 917.764654] ? get_pid_task+0xfd/0x250 [ 917.764681] ? __pfx_kernel_clone+0x10/0x10 [ 917.764716] ? find_held_lock+0x2b/0x80 [ 917.764739] ? ksys_write+0x121/0x240 [ 917.764780] ? lock_is_held_type+0x9e/0x120 [ 917.764808] __do_sys_clone3+0x1f5/0x280 [ 917.764836] ? __pfx___do_sys_clone3+0x10/0x10 [ 917.764879] ? __fget_files+0x20d/0x3b0 [ 917.764916] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.764953] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 917.764989] ? ksys_write+0x1a3/0x240 [ 917.765022] ? __pfx_ksys_write+0x10/0x10 [ 917.765063] do_syscall_64+0xbf/0x3f0 [ 917.765093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.765128] RIP: 0033:0x7f4fcedb0b19 [ 917.765145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.765165] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 917.765187] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 917.765201] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 917.765214] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.765227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.765240] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 917.765268] [ 917.799371] sysctl could not get directory: /user -12 10:56:57 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 10:56:57 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 10:56:57 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 10:56:57 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 10:56:57 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 10:56:57 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:57 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:56:57 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r1 = pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) fork() perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x1f, 0xff, 0x2d, 0x0, 0x4e57f702, 0x104, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0x3ff}, 0x802, 0x3, 0x8, 0x9, 0xfff, 0x9, 0x1000, 0x0, 0x401, 0x0, 0x7fa3}, r2, 0x2, 0xffffffffffffffff, 0x8) r3 = fork() wait4(r2, &(0x7f0000000300), 0x2, &(0x7f0000000340)) tkill(r3, 0x31) waitid(0x2, r3, &(0x7f0000000080), 0x1000000, &(0x7f0000000100)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x24, &(0x7f0000000080), 0x4) r5 = fork() tkill(r5, 0x31) fcntl$getownex(r1, 0x10, &(0x7f0000000400)={0x0, 0x0}) kcmp(r6, r3, 0xf, r4, 0xffffffffffffffff) [ 928.902521] FAULT_INJECTION: forcing a failure. [ 928.902521] name failslab, interval 1, probability 0, space 0, times 0 [ 928.903476] CPU: 1 UID: 0 PID: 16878 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 928.903495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.903504] Call Trace: [ 928.903509] [ 928.903513] dump_stack_lvl+0xfa/0x120 [ 928.903535] should_fail_ex+0x4d7/0x5e0 [ 928.903557] should_failslab+0xc2/0x120 [ 928.903578] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 928.903597] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 928.903613] ? setup_userns_sysctls+0x51/0x190 [ 928.903632] kmemdup_noprof+0x2b/0x60 [ 928.903644] setup_userns_sysctls+0x51/0x190 [ 928.903661] create_user_ns+0x8f7/0xd40 [ 928.903678] copy_creds+0x4a7/0xa30 [ 928.903698] copy_process+0xf59/0x7420 [ 928.903714] ? __pfx__kstrtoull+0x10/0x10 [ 928.903733] ? __pfx_copy_process+0x10/0x10 [ 928.903748] ? __might_fault+0xe0/0x190 [ 928.903771] ? _copy_from_user+0x5b/0xd0 [ 928.903791] kernel_clone+0xea/0x7f0 [ 928.903805] ? get_pid_task+0xfd/0x250 [ 928.903821] ? __pfx_kernel_clone+0x10/0x10 [ 928.903839] ? find_held_lock+0x2b/0x80 [ 928.903853] ? ksys_write+0x121/0x240 [ 928.903872] ? lock_is_held_type+0x9e/0x120 [ 928.903887] __do_sys_clone3+0x1f5/0x280 [ 928.903902] ? __pfx___do_sys_clone3+0x10/0x10 [ 928.903925] ? __fget_files+0x20d/0x3b0 [ 928.903945] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 928.903965] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 928.903985] ? ksys_write+0x1a3/0x240 [ 928.904002] ? __pfx_ksys_write+0x10/0x10 [ 928.904024] do_syscall_64+0xbf/0x3f0 [ 928.904041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 928.904054] RIP: 0033:0x7fd4c7d14b19 [ 928.904063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.904074] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 928.904087] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 928.904095] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 928.904102] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.904109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.904116] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 928.904131] [ 928.923706] FAULT_INJECTION: forcing a failure. [ 928.923706] name failslab, interval 1, probability 0, space 0, times 0 [ 928.924617] CPU: 1 UID: 0 PID: 16880 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 928.924632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.924638] Call Trace: [ 928.924642] [ 928.924647] dump_stack_lvl+0xfa/0x120 [ 928.924662] should_fail_ex+0x4d7/0x5e0 [ 928.924680] should_failslab+0xc2/0x120 [ 928.924699] __kmalloc_noprof+0xcd/0x680 [ 928.924711] ? __register_sysctl_table+0xd3e/0x16a0 [ 928.924728] ? lock_release+0xc8/0x290 [ 928.924745] ? __register_sysctl_table+0xd4f/0x16a0 [ 928.924767] __register_sysctl_table+0xd4f/0x16a0 [ 928.924786] ? __pfx___register_sysctl_table+0x10/0x10 [ 928.924802] ? setup_userns_sysctls+0x51/0x190 [ 928.924818] ? __asan_memcpy+0x3d/0x60 [ 928.924838] setup_userns_sysctls+0xcb/0x190 [ 928.924854] create_user_ns+0x8f7/0xd40 [ 928.924870] copy_creds+0x4a7/0xa30 [ 928.924890] copy_process+0xf59/0x7420 [ 928.924904] ? __pfx__kstrtoull+0x10/0x10 [ 928.924922] ? __pfx_copy_process+0x10/0x10 [ 928.924937] ? __might_fault+0xe0/0x190 [ 928.924955] ? _copy_from_user+0x5b/0xd0 [ 928.924974] kernel_clone+0xea/0x7f0 [ 928.924988] ? get_pid_task+0xfd/0x250 [ 928.925003] ? __pfx_kernel_clone+0x10/0x10 [ 928.925021] ? find_held_lock+0x2b/0x80 [ 928.925034] ? ksys_write+0x121/0x240 [ 928.925051] ? lock_is_held_type+0x9e/0x120 [ 928.925066] __do_sys_clone3+0x1f5/0x280 [ 928.925080] ? __pfx___do_sys_clone3+0x10/0x10 [ 928.925103] ? __fget_files+0x20d/0x3b0 [ 928.925123] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 928.925142] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 928.925161] ? ksys_write+0x1a3/0x240 [ 928.925179] ? __pfx_ksys_write+0x10/0x10 [ 928.925201] do_syscall_64+0xbf/0x3f0 [ 928.925228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 928.925239] RIP: 0033:0x7f17f1ef4b19 [ 928.925248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.925258] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 928.925270] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 928.925277] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 928.925284] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.925291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.925298] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 928.925313] [ 928.944214] sysctl could not get directory: /user -12 [ 928.949963] FAULT_INJECTION: forcing a failure. [ 928.949963] name failslab, interval 1, probability 0, space 0, times 0 [ 928.950870] CPU: 1 UID: 0 PID: 16883 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 928.950885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.950891] Call Trace: [ 928.950895] [ 928.950899] dump_stack_lvl+0xfa/0x120 [ 928.950914] should_fail_ex+0x4d7/0x5e0 [ 928.950933] ? create_user_ns+0x1ea/0xd40 [ 928.950944] should_failslab+0xc2/0x120 [ 928.950962] kmem_cache_alloc_noprof+0x80/0x690 [ 928.950980] ? create_user_ns+0x1ea/0xd40 [ 928.950992] create_user_ns+0x1ea/0xd40 [ 928.951005] ? prepare_creds+0x58d/0x7e0 [ 928.951023] copy_creds+0x4a7/0xa30 [ 928.951043] copy_process+0xf59/0x7420 [ 928.951057] ? __pfx__kstrtoull+0x10/0x10 [ 928.951075] ? __pfx_copy_process+0x10/0x10 [ 928.951090] ? __might_fault+0xe0/0x190 [ 928.951108] ? _copy_from_user+0x5b/0xd0 [ 928.951127] kernel_clone+0xea/0x7f0 [ 928.951141] ? get_pid_task+0xfd/0x250 [ 928.951155] ? __pfx_kernel_clone+0x10/0x10 [ 928.951174] ? find_held_lock+0x2b/0x80 [ 928.951186] ? ksys_write+0x121/0x240 [ 928.951204] ? lock_is_held_type+0x9e/0x120 [ 928.951218] __do_sys_clone3+0x1f5/0x280 [ 928.951233] ? __pfx___do_sys_clone3+0x10/0x10 [ 928.951256] ? __fget_files+0x20d/0x3b0 [ 928.951275] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 928.951294] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 928.951314] ? ksys_write+0x1a3/0x240 [ 928.951331] ? __pfx_ksys_write+0x10/0x10 [ 928.951353] do_syscall_64+0xbf/0x3f0 [ 928.951369] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 928.951380] RIP: 0033:0x7ff7debb3b19 [ 928.951389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.951400] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 928.951411] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 928.951419] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 928.951426] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.951433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 928.951439] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 928.951455] 10:56:57 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 10:56:57 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 10:57:09 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 10:57:09 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) waitid(0x2, r0, &(0x7f0000000080), 0x20000008, &(0x7f0000000100)) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:09 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 10:57:09 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:09 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:09 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 10:57:09 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 10:57:09 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) [ 940.244646] FAULT_INJECTION: forcing a failure. [ 940.244646] name failslab, interval 1, probability 0, space 0, times 0 [ 940.246374] CPU: 1 UID: 0 PID: 17023 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.246404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.246417] Call Trace: [ 940.246425] [ 940.246433] dump_stack_lvl+0xfa/0x120 [ 940.246469] should_fail_ex+0x4d7/0x5e0 [ 940.246506] ? dup_fd+0x4d/0xa80 [ 940.246537] should_failslab+0xc2/0x120 [ 940.246575] kmem_cache_alloc_noprof+0x80/0x690 [ 940.246602] ? __pfx_avc_has_perm+0x10/0x10 [ 940.246631] ? dup_fd+0x4d/0xa80 [ 940.246659] dup_fd+0x4d/0xa80 [ 940.246697] copy_process+0x21c4/0x7420 [ 940.246725] ? __pfx__kstrtoull+0x10/0x10 [ 940.246768] ? __pfx_copy_process+0x10/0x10 [ 940.246796] ? __might_fault+0xe0/0x190 [ 940.246831] ? _copy_from_user+0x5b/0xd0 [ 940.246868] kernel_clone+0xea/0x7f0 [ 940.246895] ? get_pid_task+0xfd/0x250 [ 940.246922] ? __pfx_kernel_clone+0x10/0x10 [ 940.246957] ? find_held_lock+0x2b/0x80 [ 940.246982] ? ksys_write+0x121/0x240 [ 940.247015] ? lock_is_held_type+0x9e/0x120 [ 940.247044] __do_sys_clone3+0x1f5/0x280 [ 940.247072] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.247114] ? __fget_files+0x20d/0x3b0 [ 940.247151] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.247187] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.247224] ? ksys_write+0x1a3/0x240 [ 940.247256] ? __pfx_ksys_write+0x10/0x10 [ 940.247298] do_syscall_64+0xbf/0x3f0 [ 940.247328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.247351] RIP: 0033:0x7f5814920b19 [ 940.247368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.247388] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.247410] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 940.247425] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.247438] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.247451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.247464] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 940.247492] [ 940.258728] FAULT_INJECTION: forcing a failure. [ 940.258728] name failslab, interval 1, probability 0, space 0, times 0 [ 940.259643] FAULT_INJECTION: forcing a failure. [ 940.259643] name failslab, interval 1, probability 0, space 0, times 0 [ 940.262896] CPU: 0 UID: 0 PID: 17026 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.262929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.262941] Call Trace: [ 940.262948] [ 940.262957] dump_stack_lvl+0xfa/0x120 [ 940.262987] should_fail_ex+0x4d7/0x5e0 [ 940.263025] should_failslab+0xc2/0x120 [ 940.263062] __kmalloc_cache_noprof+0x81/0x6b0 [ 940.263088] ? __pfx_find_ucounts+0x10/0x10 [ 940.263116] ? __ns_tree_add_raw+0x5a3/0xd20 [ 940.263141] ? alloc_ucounts+0x13e/0x450 [ 940.263173] ? alloc_ucounts+0x13e/0x450 [ 940.263200] alloc_ucounts+0x13e/0x450 [ 940.263229] ? __pfx_alloc_ucounts+0x10/0x10 [ 940.263256] ? __ns_ref_active_get_owner+0x6f/0xe0 [ 940.263283] ? create_user_ns+0x143/0xd40 [ 940.263314] copy_creds+0x57e/0xa30 [ 940.263353] copy_process+0xf59/0x7420 [ 940.263382] ? __pfx__kstrtoull+0x10/0x10 [ 940.263418] ? __pfx_copy_process+0x10/0x10 [ 940.263447] ? __might_fault+0xe0/0x190 [ 940.263483] ? _copy_from_user+0x5b/0xd0 [ 940.263522] kernel_clone+0xea/0x7f0 [ 940.263550] ? get_pid_task+0xfd/0x250 [ 940.263578] ? __pfx_kernel_clone+0x10/0x10 [ 940.263615] ? find_held_lock+0x2b/0x80 [ 940.263640] ? ksys_write+0x121/0x240 [ 940.263675] ? lock_is_held_type+0x9e/0x120 [ 940.263703] __do_sys_clone3+0x1f5/0x280 [ 940.263733] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.263784] ? __fget_files+0x20d/0x3b0 [ 940.263824] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.263862] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.263901] ? ksys_write+0x1a3/0x240 [ 940.263935] ? __pfx_ksys_write+0x10/0x10 [ 940.263979] do_syscall_64+0xbf/0x3f0 [ 940.264010] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.264033] RIP: 0033:0x7f4fcedb0b19 [ 940.264050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.264073] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.264095] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 940.264110] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.264124] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.264138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.264152] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 940.264181] [ 940.269409] FAULT_INJECTION: forcing a failure. [ 940.269409] name failslab, interval 1, probability 0, space 0, times 0 [ 940.270224] CPU: 1 UID: 0 PID: 17024 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.270277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.270298] Call Trace: [ 940.270309] [ 940.270323] dump_stack_lvl+0xfa/0x120 [ 940.270372] should_fail_ex+0x4d7/0x5e0 [ 940.270434] should_failslab+0xc2/0x120 [ 940.270488] __kmalloc_noprof+0xcd/0x680 [ 940.270521] ? __create_object+0x59/0x80 [ 940.270560] ? __register_sysctl_table+0xb5/0x16a0 [ 940.270616] __register_sysctl_table+0xb5/0x16a0 [ 940.270650] ? kasan_save_track+0x14/0x30 [ 940.270695] ? __kasan_kmalloc+0x7f/0x90 [ 940.270768] ? __pfx___register_sysctl_table+0x10/0x10 [ 940.270813] ? setup_userns_sysctls+0x51/0x190 [ 940.270848] ? __asan_memcpy+0x3d/0x60 [ 940.270891] setup_userns_sysctls+0xcb/0x190 [ 940.270927] create_user_ns+0x8f7/0xd40 [ 940.270971] copy_creds+0x4a7/0xa30 [ 940.271035] copy_process+0xf59/0x7420 [ 940.271076] ? __pfx__kstrtoull+0x10/0x10 [ 940.271117] ? __pfx_copy_process+0x10/0x10 [ 940.271150] ? __might_fault+0xe0/0x190 [ 940.271193] ? _copy_from_user+0x5b/0xd0 [ 940.271255] kernel_clone+0xea/0x7f0 [ 940.271289] ? get_pid_task+0xfd/0x250 [ 940.271320] ? __pfx_kernel_clone+0x10/0x10 [ 940.271361] ? find_held_lock+0x2b/0x80 [ 940.271389] ? ksys_write+0x121/0x240 [ 940.271427] ? lock_is_held_type+0x9e/0x120 [ 940.271459] __do_sys_clone3+0x1f5/0x280 [ 940.271491] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.271541] ? __fget_files+0x20d/0x3b0 [ 940.271585] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.271626] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.271669] ? ksys_write+0x1a3/0x240 [ 940.271707] ? __pfx_ksys_write+0x10/0x10 [ 940.271756] do_syscall_64+0xbf/0x3f0 [ 940.271791] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.271816] RIP: 0033:0x7fd4c7d14b19 [ 940.271835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.271859] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.271884] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 940.271902] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.271918] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.271935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.271951] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 940.271985] [ 940.353964] CPU: 0 UID: 0 PID: 17028 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.353995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.354008] Call Trace: [ 940.354016] [ 940.354024] dump_stack_lvl+0xfa/0x120 [ 940.354057] should_fail_ex+0x4d7/0x5e0 [ 940.354097] should_failslab+0xc2/0x120 [ 940.354136] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 940.354172] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 940.354199] ? setup_userns_sysctls+0x51/0x190 [ 940.354234] kmemdup_noprof+0x2b/0x60 [ 940.354257] setup_userns_sysctls+0x51/0x190 [ 940.354289] create_user_ns+0x8f7/0xd40 [ 940.354319] copy_creds+0x4a7/0xa30 [ 940.354358] copy_process+0xf59/0x7420 [ 940.354387] ? __pfx__kstrtoull+0x10/0x10 [ 940.354422] ? __pfx_copy_process+0x10/0x10 [ 940.354451] ? __might_fault+0xe0/0x190 [ 940.354487] ? _copy_from_user+0x5b/0xd0 [ 940.354525] kernel_clone+0xea/0x7f0 [ 940.354552] ? get_pid_task+0xfd/0x250 [ 940.354581] ? __pfx_kernel_clone+0x10/0x10 [ 940.354617] ? find_held_lock+0x2b/0x80 [ 940.354642] ? ksys_write+0x121/0x240 [ 940.354676] ? lock_is_held_type+0x9e/0x120 [ 940.354705] __do_sys_clone3+0x1f5/0x280 [ 940.354734] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.354784] ? __fget_files+0x20d/0x3b0 [ 940.354824] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.354861] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.354900] ? ksys_write+0x1a3/0x240 [ 940.354933] ? __pfx_ksys_write+0x10/0x10 [ 940.354976] do_syscall_64+0xbf/0x3f0 [ 940.355008] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.355030] RIP: 0033:0x7ff7debb3b19 [ 940.355048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.355069] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.355091] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 940.355107] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.355121] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.355134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.355148] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 940.355177] 10:57:09 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 10:57:09 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 10:57:09 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 10:57:09 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) [ 940.530711] FAULT_INJECTION: forcing a failure. [ 940.530711] name failslab, interval 1, probability 0, space 0, times 0 [ 940.532588] CPU: 1 UID: 0 PID: 17134 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.532621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.532635] Call Trace: [ 940.532643] [ 940.532653] dump_stack_lvl+0xfa/0x120 [ 940.532691] should_fail_ex+0x4d7/0x5e0 [ 940.532733] should_failslab+0xc2/0x120 [ 940.532781] __kmalloc_cache_noprof+0x81/0x6b0 [ 940.532809] ? __pfx_find_ucounts+0x10/0x10 [ 940.532839] ? __ns_tree_add_raw+0x5a3/0xd20 [ 940.532864] ? alloc_ucounts+0x13e/0x450 [ 940.532899] ? alloc_ucounts+0x13e/0x450 [ 940.532927] alloc_ucounts+0x13e/0x450 [ 940.532957] ? __pfx_alloc_ucounts+0x10/0x10 [ 940.532985] ? __ns_ref_active_get_owner+0x6f/0xe0 [ 940.533013] ? create_user_ns+0x143/0xd40 [ 940.533047] copy_creds+0x57e/0xa30 [ 940.533087] copy_process+0xf59/0x7420 [ 940.533118] ? __pfx__kstrtoull+0x10/0x10 [ 940.533158] ? __pfx_copy_process+0x10/0x10 [ 940.533188] ? __might_fault+0xe0/0x190 [ 940.533227] ? _copy_from_user+0x5b/0xd0 [ 940.533268] kernel_clone+0xea/0x7f0 [ 940.533298] ? get_pid_task+0xfd/0x250 [ 940.533328] ? __pfx_kernel_clone+0x10/0x10 [ 940.533391] ? find_held_lock+0x2b/0x80 [ 940.533422] ? ksys_write+0x121/0x240 [ 940.533459] ? lock_is_held_type+0x9e/0x120 [ 940.533491] __do_sys_clone3+0x1f5/0x280 [ 940.533522] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.533569] ? __fget_files+0x20d/0x3b0 [ 940.533611] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.533651] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.533692] ? ksys_write+0x1a3/0x240 [ 940.533727] ? __pfx_ksys_write+0x10/0x10 [ 940.533774] do_syscall_64+0xbf/0x3f0 [ 940.533807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.533837] RIP: 0033:0x7f5814920b19 [ 940.533856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.533878] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.533902] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 940.533919] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.533934] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.533948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.533962] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 940.533994] 10:57:09 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 10:57:09 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:09 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:09 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 10:57:09 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:09 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) [ 940.855011] FAULT_INJECTION: forcing a failure. [ 940.855011] name failslab, interval 1, probability 0, space 0, times 0 [ 940.856561] CPU: 0 UID: 0 PID: 17252 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.856583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.856592] Call Trace: [ 940.856597] [ 940.856603] dump_stack_lvl+0xfa/0x120 [ 940.856629] should_fail_ex+0x4d7/0x5e0 [ 940.856657] should_failslab+0xc2/0x120 [ 940.856684] __kmalloc_noprof+0xcd/0x680 [ 940.856701] ? __create_object+0x59/0x80 [ 940.856719] ? __register_sysctl_table+0xb5/0x16a0 [ 940.856745] __register_sysctl_table+0xb5/0x16a0 [ 940.856771] ? kasan_save_track+0x14/0x30 [ 940.856797] ? __kasan_kmalloc+0x7f/0x90 [ 940.856825] ? __pfx___register_sysctl_table+0x10/0x10 [ 940.856845] ? setup_userns_sysctls+0x51/0x190 [ 940.856868] ? __asan_memcpy+0x3d/0x60 [ 940.856894] setup_userns_sysctls+0xcb/0x190 [ 940.856915] create_user_ns+0x8f7/0xd40 [ 940.856938] copy_creds+0x4a7/0xa30 [ 940.856965] copy_process+0xf59/0x7420 [ 940.856985] ? __pfx__kstrtoull+0x10/0x10 [ 940.857011] ? __pfx_copy_process+0x10/0x10 [ 940.857030] ? __might_fault+0xe0/0x190 [ 940.857056] ? _copy_from_user+0x5b/0xd0 [ 940.857082] kernel_clone+0xea/0x7f0 [ 940.857101] ? get_pid_task+0xfd/0x250 [ 940.857121] ? __pfx_kernel_clone+0x10/0x10 [ 940.857146] ? find_held_lock+0x2b/0x80 [ 940.857164] ? ksys_write+0x121/0x240 [ 940.857188] ? lock_is_held_type+0x9e/0x120 [ 940.857209] __do_sys_clone3+0x1f5/0x280 [ 940.857228] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.857258] ? __fget_files+0x20d/0x3b0 [ 940.857285] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.857312] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.857338] ? ksys_write+0x1a3/0x240 [ 940.857371] ? __pfx_ksys_write+0x10/0x10 [ 940.857400] do_syscall_64+0xbf/0x3f0 [ 940.857422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.857439] RIP: 0033:0x7ff7debb3b19 [ 940.857451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.857466] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.857482] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 940.857492] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.857502] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.857511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.857520] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 940.857540] [ 940.897057] FAULT_INJECTION: forcing a failure. [ 940.897057] name failslab, interval 1, probability 0, space 0, times 0 [ 940.898798] CPU: 0 UID: 0 PID: 17253 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 940.898828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.898841] Call Trace: [ 940.898848] [ 940.898857] dump_stack_lvl+0xfa/0x120 [ 940.898892] should_fail_ex+0x4d7/0x5e0 [ 940.898930] should_failslab+0xc2/0x120 [ 940.898967] __kmalloc_cache_noprof+0x81/0x6b0 [ 940.898995] ? alloc_fdtable+0x9e/0x2d0 [ 940.899030] ? alloc_fdtable+0x9e/0x2d0 [ 940.899058] alloc_fdtable+0x9e/0x2d0 [ 940.899089] dup_fd+0x6ef/0xa80 [ 940.899126] copy_process+0x21c4/0x7420 [ 940.899155] ? __pfx__kstrtoull+0x10/0x10 [ 940.899190] ? __pfx_copy_process+0x10/0x10 [ 940.899218] ? __might_fault+0xe0/0x190 [ 940.899253] ? _copy_from_user+0x5b/0xd0 [ 940.899290] kernel_clone+0xea/0x7f0 [ 940.899316] ? get_pid_task+0xfd/0x250 [ 940.899344] ? __pfx_kernel_clone+0x10/0x10 [ 940.899379] ? find_held_lock+0x2b/0x80 [ 940.899404] ? ksys_write+0x121/0x240 [ 940.899437] ? lock_is_held_type+0x9e/0x120 [ 940.899465] __do_sys_clone3+0x1f5/0x280 [ 940.899493] ? __pfx___do_sys_clone3+0x10/0x10 [ 940.899535] ? __fget_files+0x20d/0x3b0 [ 940.899572] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.899608] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 940.899645] ? ksys_write+0x1a3/0x240 [ 940.899677] ? __pfx_ksys_write+0x10/0x10 [ 940.899719] do_syscall_64+0xbf/0x3f0 [ 940.899749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.899779] RIP: 0033:0x7f5814920b19 [ 940.899796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.899817] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.899838] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 940.899853] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 940.899866] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.899879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 940.899891] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 940.899920] 10:57:23 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 10:57:23 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 10:57:23 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r1 = pidfd_open(r0, 0x0) pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) waitid(0x0, 0x0, &(0x7f0000000440), 0x2, &(0x7f0000000600)) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x8, 0x6, 0x4, 0x5, 0x0, 0x100000000, 0x80420, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x5, 0xffffffff, 0x7, 0x20, 0x400, 0x1, 0x0, 0x80000000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x5) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x89, 0x0, 0xba, 0x7f, 0x0, 0x3f, 0x8000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x5, 0xffff}, 0x41004, 0x10001, 0x1000, 0x4, 0xf2, 0x101, 0x7, 0x0, 0x200, 0x0, 0x6}, r3, 0x5, r4, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r6 = pidfd_open(r5, 0x0) r7 = fork() r8 = fork() tkill(r8, 0x31) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, &(0x7f0000000080)={r8, 0x0, 0x20}) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="cbc10000001000000000670000000c0099003f0000002f000000"], 0x20}}, 0x2000c080) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r6, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100027bd7000fbdbdf257f00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990001005c00490000000a00f500a6e3144c9f390000"], 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x48004) kcmp(r2, r7, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:23 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 10:57:23 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 10:57:23 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 10:57:23 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:23 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 954.196862] FAULT_INJECTION: forcing a failure. [ 954.196862] name failslab, interval 1, probability 0, space 0, times 0 [ 954.197978] CPU: 0 UID: 0 PID: 17273 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 954.197995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.198003] Call Trace: [ 954.198007] [ 954.198012] dump_stack_lvl+0xfa/0x120 [ 954.198034] should_fail_ex+0x4d7/0x5e0 [ 954.198056] ? dup_fd+0x4d/0xa80 [ 954.198074] should_failslab+0xc2/0x120 [ 954.198097] kmem_cache_alloc_noprof+0x80/0x690 [ 954.198112] ? __pfx_avc_has_perm+0x10/0x10 [ 954.198130] ? dup_fd+0x4d/0xa80 [ 954.198146] dup_fd+0x4d/0xa80 [ 954.198168] copy_process+0x21c4/0x7420 [ 954.198184] ? __pfx__kstrtoull+0x10/0x10 [ 954.198205] ? __pfx_copy_process+0x10/0x10 [ 954.198222] ? __might_fault+0xe0/0x190 [ 954.198242] ? _copy_from_user+0x5b/0xd0 [ 954.198264] kernel_clone+0xea/0x7f0 [ 954.198279] ? get_pid_task+0xfd/0x250 [ 954.198296] ? __pfx_kernel_clone+0x10/0x10 [ 954.198316] ? find_held_lock+0x2b/0x80 [ 954.198331] ? ksys_write+0x121/0x240 [ 954.198350] ? lock_is_held_type+0x9e/0x120 [ 954.198368] __do_sys_clone3+0x1f5/0x280 [ 954.198384] ? __pfx___do_sys_clone3+0x10/0x10 [ 954.198409] ? __fget_files+0x20d/0x3b0 [ 954.198430] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 954.198451] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 954.198473] ? ksys_write+0x1a3/0x240 [ 954.198491] ? __pfx_ksys_write+0x10/0x10 [ 954.198516] do_syscall_64+0xbf/0x3f0 [ 954.198534] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 954.198547] RIP: 0033:0x7f4fcedb0b19 [ 954.198557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.198569] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 954.198583] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 954.198591] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 954.198599] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.198606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 954.198614] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 954.198630] 10:57:23 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) [ 954.256251] FAULT_INJECTION: forcing a failure. [ 954.256251] name failslab, interval 1, probability 0, space 0, times 0 [ 954.257346] CPU: 0 UID: 0 PID: 17278 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 954.257369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.257379] Call Trace: [ 954.257385] [ 954.257391] dump_stack_lvl+0xfa/0x120 [ 954.257418] should_fail_ex+0x4d7/0x5e0 [ 954.257447] should_failslab+0xc2/0x120 [ 954.257475] __kmalloc_noprof+0xcd/0x680 [ 954.257502] ? __register_sysctl_table+0xd3e/0x16a0 [ 954.257525] ? lock_release+0xc8/0x290 [ 954.257549] ? __register_sysctl_table+0xd4f/0x16a0 [ 954.257575] __register_sysctl_table+0xd4f/0x16a0 [ 954.257602] ? __pfx___register_sysctl_table+0x10/0x10 [ 954.257623] ? setup_userns_sysctls+0x51/0x190 [ 954.257646] ? __asan_memcpy+0x3d/0x60 [ 954.257673] setup_userns_sysctls+0xcb/0x190 [ 954.257698] create_user_ns+0x8f7/0xd40 [ 954.257721] copy_creds+0x4a7/0xa30 [ 954.257749] copy_process+0xf59/0x7420 [ 954.257775] ? __pfx__kstrtoull+0x10/0x10 [ 954.257802] ? __pfx_copy_process+0x10/0x10 [ 954.257823] ? __might_fault+0xe0/0x190 [ 954.257849] ? _copy_from_user+0x5b/0xd0 [ 954.257876] kernel_clone+0xea/0x7f0 [ 954.257896] ? get_pid_task+0xfd/0x250 [ 954.257917] ? __pfx_kernel_clone+0x10/0x10 [ 954.257944] ? find_held_lock+0x2b/0x80 [ 954.257961] ? ksys_write+0x121/0x240 [ 954.257987] ? lock_is_held_type+0x9e/0x120 [ 954.258009] __do_sys_clone3+0x1f5/0x280 [ 954.258029] ? __pfx___do_sys_clone3+0x10/0x10 [ 954.258061] ? __fget_files+0x20d/0x3b0 [ 954.258090] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 954.258114] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 954.258134] ? ksys_write+0x1a3/0x240 [ 954.258152] ? __pfx_ksys_write+0x10/0x10 [ 954.258175] do_syscall_64+0xbf/0x3f0 [ 954.258192] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 954.258205] RIP: 0033:0x7fd4c7d14b19 [ 954.258215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.258227] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 954.258239] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 954.258248] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 954.258255] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.258262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 954.258269] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 954.258285] [ 954.279455] sysctl could not get directory: /user -12 10:57:23 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:23 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 10:57:34 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:34 executing program 4: r0 = getpid() r1 = fork() tkill(r1, 0x31) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/dev\x00') waitid(0x1, r0, &(0x7f0000000580), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r3 = fork() r4 = fork() tkill(r4, 0x31) ptrace(0x11, r4) tkill(r3, 0x31) r5 = fork() clone3(&(0x7f0000000440)={0x2e0000000, &(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180), {0x9}, &(0x7f0000000280)=""/101, 0x65, &(0x7f0000000300)=""/234, &(0x7f0000000400), 0x0, {r2}}, 0x58) pidfd_open(0x0, 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, 0x3e9, 0x100, 0x70bd2d, 0x25dfdbff, {0x0, 0x1, 0x1, r6, 0x7, 0x3, 0x80000001, 0x7f, 0x0, 0x3}, ["", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x60) ptrace(0x8, r0) kcmp(r3, r5, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:34 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 10:57:34 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 10:57:34 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x0, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:34 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 10:57:34 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 10:57:34 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) [ 965.362549] FAULT_INJECTION: forcing a failure. [ 965.362549] name failslab, interval 1, probability 0, space 0, times 0 [ 965.363535] CPU: 0 UID: 0 PID: 17410 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.363551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.363559] Call Trace: [ 965.363563] [ 965.363567] dump_stack_lvl+0xfa/0x120 [ 965.363589] should_fail_ex+0x4d7/0x5e0 [ 965.363610] should_failslab+0xc2/0x120 [ 965.363631] __kmalloc_cache_noprof+0x81/0x6b0 [ 965.363645] ? __pfx_find_ucounts+0x10/0x10 [ 965.363660] ? __ns_tree_add_raw+0x5a3/0xd20 [ 965.363673] ? alloc_ucounts+0x13e/0x450 [ 965.363690] ? alloc_ucounts+0x13e/0x450 [ 965.363703] alloc_ucounts+0x13e/0x450 [ 965.363717] ? __pfx_alloc_ucounts+0x10/0x10 [ 965.363731] ? __ns_ref_active_get_owner+0x6f/0xe0 [ 965.363745] ? create_user_ns+0x143/0xd40 [ 965.363766] copy_creds+0x57e/0xa30 [ 965.363786] copy_process+0xf59/0x7420 [ 965.363802] ? __pfx__kstrtoull+0x10/0x10 [ 965.363822] ? __pfx_copy_process+0x10/0x10 [ 965.363837] ? __might_fault+0xe0/0x190 [ 965.363856] ? _copy_from_user+0x5b/0xd0 [ 965.363877] kernel_clone+0xea/0x7f0 [ 965.363891] ? get_pid_task+0xfd/0x250 [ 965.363906] ? __pfx_kernel_clone+0x10/0x10 [ 965.363925] ? find_held_lock+0x2b/0x80 [ 965.363939] ? ksys_write+0x121/0x240 [ 965.363958] ? lock_is_held_type+0x9e/0x120 [ 965.363973] __do_sys_clone3+0x1f5/0x280 [ 965.363988] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.364011] ? __fget_files+0x20d/0x3b0 [ 965.364032] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.364052] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.364072] ? ksys_write+0x1a3/0x240 [ 965.364089] ? __pfx_ksys_write+0x10/0x10 [ 965.364111] do_syscall_64+0xbf/0x3f0 [ 965.364128] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.364141] RIP: 0033:0x7fd4c7d14b19 [ 965.364150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.364161] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.364174] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 965.364182] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.364189] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.364197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.364204] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 965.364219] [ 965.399176] FAULT_INJECTION: forcing a failure. [ 965.399176] name failslab, interval 1, probability 0, space 0, times 0 [ 965.401334] CPU: 1 UID: 0 PID: 17414 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.401370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.401386] Call Trace: [ 965.401395] [ 965.401405] dump_stack_lvl+0xfa/0x120 [ 965.401446] should_fail_ex+0x4d7/0x5e0 [ 965.401490] ? dup_fd+0x4d/0xa80 [ 965.401528] should_failslab+0xc2/0x120 [ 965.401573] kmem_cache_alloc_noprof+0x80/0x690 [ 965.401620] ? __pfx_avc_has_perm+0x10/0x10 [ 965.401656] ? dup_fd+0x4d/0xa80 [ 965.401691] dup_fd+0x4d/0xa80 [ 965.401737] copy_process+0x21c4/0x7420 [ 965.401779] ? __pfx__kstrtoull+0x10/0x10 [ 965.401823] ? __pfx_copy_process+0x10/0x10 [ 965.401857] ? __might_fault+0xe0/0x190 [ 965.401901] ? _copy_from_user+0x5b/0xd0 [ 965.401946] kernel_clone+0xea/0x7f0 [ 965.401979] ? get_pid_task+0xfd/0x250 [ 965.402013] ? __pfx_kernel_clone+0x10/0x10 [ 965.402056] ? find_held_lock+0x2b/0x80 [ 965.402086] ? ksys_write+0x121/0x240 [ 965.402127] ? lock_is_held_type+0x9e/0x120 [ 965.402162] __do_sys_clone3+0x1f5/0x280 [ 965.402196] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.402249] ? __fget_files+0x20d/0x3b0 [ 965.402295] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.402340] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.402385] ? ksys_write+0x1a3/0x240 [ 965.402425] ? __pfx_ksys_write+0x10/0x10 [ 965.402477] do_syscall_64+0xbf/0x3f0 [ 965.402514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.402541] RIP: 0033:0x7f17f1ef4b19 [ 965.402562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.402587] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.402614] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 965.402632] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.402648] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.402664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.402680] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 965.402716] [ 965.413691] FAULT_INJECTION: forcing a failure. [ 965.413691] name failslab, interval 1, probability 0, space 0, times 0 [ 965.417920] FAULT_INJECTION: forcing a failure. [ 965.417920] name failslab, interval 1, probability 0, space 0, times 0 [ 965.418164] CPU: 0 UID: 0 PID: 17417 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.418182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.418190] Call Trace: [ 965.418195] [ 965.418199] dump_stack_lvl+0xfa/0x120 [ 965.418220] should_fail_ex+0x4d7/0x5e0 [ 965.418242] should_failslab+0xc2/0x120 [ 965.418262] __kvmalloc_node_noprof+0x11f/0x770 [ 965.418281] ? alloc_fdtable+0xf2/0x2d0 [ 965.418302] ? alloc_fdtable+0xf2/0x2d0 [ 965.418317] alloc_fdtable+0xf2/0x2d0 [ 965.418336] dup_fd+0x6ef/0xa80 [ 965.418358] copy_process+0x21c4/0x7420 [ 965.418375] ? __pfx__kstrtoull+0x10/0x10 [ 965.418395] ? __pfx_copy_process+0x10/0x10 [ 965.418410] ? __might_fault+0xe0/0x190 [ 965.418430] ? _copy_from_user+0x5b/0xd0 [ 965.418450] kernel_clone+0xea/0x7f0 [ 965.418464] ? get_pid_task+0xfd/0x250 [ 965.418480] ? __pfx_kernel_clone+0x10/0x10 [ 965.418499] ? find_held_lock+0x2b/0x80 [ 965.418513] ? ksys_write+0x121/0x240 [ 965.418532] ? lock_is_held_type+0x9e/0x120 [ 965.418549] __do_sys_clone3+0x1f5/0x280 [ 965.418564] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.418587] ? __fget_files+0x20d/0x3b0 [ 965.418607] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.418627] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.418647] ? ksys_write+0x1a3/0x240 [ 965.418664] ? __pfx_ksys_write+0x10/0x10 [ 965.418687] do_syscall_64+0xbf/0x3f0 [ 965.418704] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.418716] RIP: 0033:0x7f5814920b19 [ 965.418726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.418737] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.418749] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 965.418762] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.418769] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.418777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.418784] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 965.418800] [ 965.471319] CPU: 1 UID: 0 PID: 17415 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.471354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.471368] Call Trace: [ 965.471377] [ 965.471387] dump_stack_lvl+0xfa/0x120 [ 965.471423] should_fail_ex+0x4d7/0x5e0 [ 965.471463] should_failslab+0xc2/0x120 [ 965.471503] __kmalloc_cache_noprof+0x81/0x6b0 [ 965.471532] ? alloc_fdtable+0x9e/0x2d0 [ 965.471570] ? alloc_fdtable+0x9e/0x2d0 [ 965.471600] alloc_fdtable+0x9e/0x2d0 [ 965.471633] dup_fd+0x6ef/0xa80 [ 965.471673] copy_process+0x21c4/0x7420 [ 965.471703] ? __pfx__kstrtoull+0x10/0x10 [ 965.471741] ? __pfx_copy_process+0x10/0x10 [ 965.471778] ? __might_fault+0xe0/0x190 [ 965.471815] ? _copy_from_user+0x5b/0xd0 [ 965.471854] kernel_clone+0xea/0x7f0 [ 965.471882] ? get_pid_task+0xfd/0x250 [ 965.471911] ? __pfx_kernel_clone+0x10/0x10 [ 965.471949] ? find_held_lock+0x2b/0x80 [ 965.471975] ? ksys_write+0x121/0x240 10:57:34 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) [ 965.472010] ? lock_is_held_type+0x9e/0x120 [ 965.472040] __do_sys_clone3+0x1f5/0x280 [ 965.472070] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.472116] ? __fget_files+0x20d/0x3b0 [ 965.472155] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.472193] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.472233] ? ksys_write+0x1a3/0x240 [ 965.472268] ? __pfx_ksys_write+0x10/0x10 [ 965.472312] do_syscall_64+0xbf/0x3f0 [ 965.472345] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.472369] RIP: 0033:0x7f4fcedb0b19 [ 965.472389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.472411] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 10:57:34 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x0, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 965.472435] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 965.472450] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.472464] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.472478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.472492] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 965.472523] [ 965.533016] FAULT_INJECTION: forcing a failure. [ 965.533016] name failslab, interval 1, probability 0, space 0, times 0 [ 965.534814] CPU: 1 UID: 0 PID: 17423 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.534846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.534859] Call Trace: [ 965.534867] [ 965.534876] dump_stack_lvl+0xfa/0x120 [ 965.534912] should_fail_ex+0x4d7/0x5e0 [ 965.534952] should_failslab+0xc2/0x120 [ 965.534991] __kmalloc_noprof+0xcd/0x680 [ 965.535015] ? __register_sysctl_table+0xd3e/0x16a0 [ 965.535049] ? lock_release+0xc8/0x290 [ 965.535083] ? __register_sysctl_table+0xd4f/0x16a0 [ 965.535120] __register_sysctl_table+0xd4f/0x16a0 [ 965.535158] ? __pfx___register_sysctl_table+0x10/0x10 [ 965.535189] ? setup_userns_sysctls+0x51/0x190 [ 965.535222] ? __asan_memcpy+0x3d/0x60 [ 965.535261] setup_userns_sysctls+0xcb/0x190 [ 965.535294] create_user_ns+0x8f7/0xd40 [ 965.535326] copy_creds+0x4a7/0xa30 [ 965.535366] copy_process+0xf59/0x7420 [ 965.535396] ? __pfx__kstrtoull+0x10/0x10 [ 965.535434] ? __pfx_copy_process+0x10/0x10 [ 965.535464] ? __might_fault+0xe0/0x190 [ 965.535501] ? _copy_from_user+0x5b/0xd0 [ 965.535541] kernel_clone+0xea/0x7f0 [ 965.535569] ? get_pid_task+0xfd/0x250 [ 965.535598] ? __pfx_kernel_clone+0x10/0x10 [ 965.535635] ? find_held_lock+0x2b/0x80 [ 965.535660] ? ksys_write+0x121/0x240 [ 965.535696] ? lock_is_held_type+0x9e/0x120 [ 965.535726] __do_sys_clone3+0x1f5/0x280 [ 965.535763] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.535809] ? __fget_files+0x20d/0x3b0 [ 965.535850] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.535888] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.535927] ? ksys_write+0x1a3/0x240 [ 965.535962] ? __pfx_ksys_write+0x10/0x10 [ 965.536007] do_syscall_64+0xbf/0x3f0 [ 965.536039] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.536063] RIP: 0033:0x7ff7debb3b19 [ 965.536082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.536103] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.536127] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 965.536142] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.536156] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.536170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.536184] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 965.536214] [ 965.574595] sysctl could not get directory: /user -12 10:57:34 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) [ 965.635995] FAULT_INJECTION: forcing a failure. [ 965.635995] name failslab, interval 1, probability 0, space 0, times 0 [ 965.637825] CPU: 1 UID: 0 PID: 17446 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.637856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.637870] Call Trace: [ 965.637878] [ 965.637886] dump_stack_lvl+0xfa/0x120 [ 965.637923] should_fail_ex+0x4d7/0x5e0 [ 965.637963] should_failslab+0xc2/0x120 [ 965.638002] __kmalloc_cache_noprof+0x81/0x6b0 [ 965.638031] ? alloc_fdtable+0x9e/0x2d0 [ 965.638069] ? alloc_fdtable+0x9e/0x2d0 [ 965.638099] alloc_fdtable+0x9e/0x2d0 [ 965.638132] dup_fd+0x6ef/0xa80 [ 965.638172] copy_process+0x21c4/0x7420 [ 965.638202] ? __pfx__kstrtoull+0x10/0x10 [ 965.638240] ? __pfx_copy_process+0x10/0x10 [ 965.638270] ? __might_fault+0xe0/0x190 [ 965.638307] ? _copy_from_user+0x5b/0xd0 [ 965.638346] kernel_clone+0xea/0x7f0 [ 965.638375] ? get_pid_task+0xfd/0x250 [ 965.638404] ? __pfx_kernel_clone+0x10/0x10 10:57:34 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) [ 965.638441] ? find_held_lock+0x2b/0x80 [ 965.638468] ? ksys_write+0x121/0x240 [ 965.638503] ? lock_is_held_type+0x9e/0x120 [ 965.638533] __do_sys_clone3+0x1f5/0x280 [ 965.638563] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.638609] ? __fget_files+0x20d/0x3b0 [ 965.638649] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.638687] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.638727] ? ksys_write+0x1a3/0x240 [ 965.638769] ? __pfx_ksys_write+0x10/0x10 [ 965.638814] do_syscall_64+0xbf/0x3f0 [ 965.638846] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.638869] RIP: 0033:0x7f5814920b19 [ 965.638887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.638909] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.638932] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 965.638948] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.638962] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.638976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.638990] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 965.639021] 10:57:34 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 10:57:34 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 10:57:34 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:34 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 10:57:34 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() r2 = fork() tkill(r2, 0x31) waitid(0x0, r2, &(0x7f0000000080), 0x2, 0x0) tkill(r1, 0x31) r3 = fork() kcmp(r1, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) [ 965.885906] FAULT_INJECTION: forcing a failure. [ 965.885906] name failslab, interval 1, probability 0, space 0, times 0 [ 965.887623] CPU: 1 UID: 0 PID: 17544 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.887652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.887665] Call Trace: [ 965.887672] [ 965.887680] dump_stack_lvl+0xfa/0x120 [ 965.887715] should_fail_ex+0x4d7/0x5e0 [ 965.887752] should_failslab+0xc2/0x120 [ 965.887795] __kvmalloc_node_noprof+0x11f/0x770 [ 965.887829] ? alloc_fdtable+0x163/0x2d0 10:57:34 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) [ 965.887865] ? alloc_fdtable+0x163/0x2d0 [ 965.887891] alloc_fdtable+0x163/0x2d0 [ 965.887922] dup_fd+0x6ef/0xa80 [ 965.887959] copy_process+0x21c4/0x7420 [ 965.887989] ? __lock_acquire+0x694/0x1b70 [ 965.888033] ? __pfx_copy_process+0x10/0x10 [ 965.888061] ? __might_fault+0xe0/0x190 [ 965.888096] ? _copy_from_user+0x5b/0xd0 [ 965.888133] kernel_clone+0xea/0x7f0 [ 965.888160] ? find_held_lock+0x2b/0x80 [ 965.888184] ? __pfx_kernel_clone+0x10/0x10 [ 965.888223] ? trace_sched_exit_tp+0xbf/0x100 [ 965.888251] __do_sys_clone3+0x1f5/0x280 [ 965.888279] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.888321] ? __fget_files+0x20d/0x3b0 [ 965.888356] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.888393] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.888427] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.888463] ? ksys_write+0x1a3/0x240 [ 965.888507] do_syscall_64+0xbf/0x3f0 [ 965.888537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.888560] RIP: 0033:0x7f5814920b19 [ 965.888577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.888597] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.888619] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 965.888634] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.888647] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.888660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.888672] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 965.888701] [ 965.986720] FAULT_INJECTION: forcing a failure. [ 965.986720] name failslab, interval 1, probability 0, space 0, times 0 [ 965.989517] CPU: 0 UID: 0 PID: 17547 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 965.989541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.989552] Call Trace: [ 965.989558] [ 965.989564] dump_stack_lvl+0xfa/0x120 [ 965.989594] should_fail_ex+0x4d7/0x5e0 [ 965.989634] ? dup_fd+0x4d/0xa80 [ 965.989659] should_failslab+0xc2/0x120 [ 965.989692] kmem_cache_alloc_noprof+0x80/0x690 [ 965.989713] ? __pfx_avc_has_perm+0x10/0x10 [ 965.989736] ? dup_fd+0x4d/0xa80 [ 965.989763] dup_fd+0x4d/0xa80 [ 965.989791] copy_process+0x21c4/0x7420 [ 965.989813] ? __pfx__kstrtoull+0x10/0x10 [ 965.989841] ? __pfx_copy_process+0x10/0x10 [ 965.989862] ? __might_fault+0xe0/0x190 [ 965.989889] ? _copy_from_user+0x5b/0xd0 [ 965.989918] kernel_clone+0xea/0x7f0 [ 965.989938] ? get_pid_task+0xfd/0x250 [ 965.989959] ? __pfx_kernel_clone+0x10/0x10 [ 965.989986] ? find_held_lock+0x2b/0x80 [ 965.990008] ? ksys_write+0x121/0x240 [ 965.990036] ? lock_is_held_type+0x9e/0x120 [ 965.990058] __do_sys_clone3+0x1f5/0x280 [ 965.990079] ? __pfx___do_sys_clone3+0x10/0x10 [ 965.990110] ? __fget_files+0x20d/0x3b0 [ 965.990138] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.990166] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 965.990193] ? ksys_write+0x1a3/0x240 [ 965.990217] ? __pfx_ksys_write+0x10/0x10 [ 965.990248] do_syscall_64+0xbf/0x3f0 [ 965.990272] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.990290] RIP: 0033:0x7fd4c7d14b19 [ 965.990303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.990319] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 965.990336] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 965.990347] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 965.990357] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.990367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.990377] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 965.990399] 10:57:46 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 10:57:46 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 10:57:46 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:46 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 10:57:46 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x0, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:46 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 10:57:46 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 10:57:46 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) waitid(0x0, r1, &(0x7f0000000080), 0x8, 0x0) r2 = fork() tkill(r2, 0x31) r3 = fork() kcmp(r2, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) [ 978.144319] FAULT_INJECTION: forcing a failure. [ 978.144319] name failslab, interval 1, probability 0, space 0, times 0 [ 978.145342] CPU: 0 UID: 0 PID: 17666 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 978.145360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 978.145369] Call Trace: [ 978.145374] [ 978.145379] dump_stack_lvl+0xfa/0x120 [ 978.145401] should_fail_ex+0x4d7/0x5e0 [ 978.145425] should_failslab+0xc2/0x120 [ 978.145448] __kmalloc_cache_noprof+0x81/0x6b0 [ 978.145465] ? alloc_fdtable+0x9e/0x2d0 [ 978.145486] ? alloc_fdtable+0x9e/0x2d0 [ 978.145503] alloc_fdtable+0x9e/0x2d0 [ 978.145522] dup_fd+0x6ef/0xa80 [ 978.145545] copy_process+0x21c4/0x7420 [ 978.145563] ? __lock_acquire+0x694/0x1b70 [ 978.145591] ? __pfx_copy_process+0x10/0x10 [ 978.145607] ? __might_fault+0xe0/0x190 [ 978.145629] ? _copy_from_user+0x5b/0xd0 [ 978.145652] kernel_clone+0xea/0x7f0 [ 978.145668] ? find_held_lock+0x2b/0x80 [ 978.145684] ? __pfx_kernel_clone+0x10/0x10 [ 978.145706] ? trace_sched_exit_tp+0xbf/0x100 [ 978.145724] __do_sys_clone3+0x1f5/0x280 [ 978.145741] ? __pfx___do_sys_clone3+0x10/0x10 [ 978.145782] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.145805] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.145826] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.145849] ? ksys_write+0x1a3/0x240 [ 978.145869] ? xfd_validate_state+0x55/0x180 [ 978.145896] do_syscall_64+0xbf/0x3f0 [ 978.145914] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.145929] RIP: 0033:0x7f17f1ef4b19 [ 978.145939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 978.145952] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 978.145966] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 978.145974] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 978.145982] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 978.145990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.145998] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 978.146015] [ 978.177419] FAULT_INJECTION: forcing a failure. [ 978.177419] name failslab, interval 1, probability 0, space 0, times 0 [ 978.179317] CPU: 1 UID: 0 PID: 17671 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 978.179349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 978.179363] Call Trace: [ 978.179371] [ 978.179380] dump_stack_lvl+0xfa/0x120 [ 978.179414] should_fail_ex+0x4d7/0x5e0 [ 978.179455] should_failslab+0xc2/0x120 [ 978.179496] __kvmalloc_node_noprof+0x11f/0x770 [ 978.179533] ? alloc_fdtable+0xf2/0x2d0 [ 978.179572] ? alloc_fdtable+0xf2/0x2d0 [ 978.179602] alloc_fdtable+0xf2/0x2d0 [ 978.179635] dup_fd+0x6ef/0xa80 [ 978.179682] copy_process+0x21c4/0x7420 [ 978.179713] ? __pfx__kstrtoull+0x10/0x10 [ 978.179752] ? __pfx_copy_process+0x10/0x10 [ 978.179789] ? __might_fault+0xe0/0x190 [ 978.179827] ? _copy_from_user+0x5b/0xd0 [ 978.179868] kernel_clone+0xea/0x7f0 [ 978.179897] ? get_pid_task+0xfd/0x250 [ 978.179927] ? __pfx_kernel_clone+0x10/0x10 [ 978.179966] ? find_held_lock+0x2b/0x80 [ 978.179993] ? ksys_write+0x121/0x240 [ 978.180029] ? lock_is_held_type+0x9e/0x120 [ 978.180060] __do_sys_clone3+0x1f5/0x280 [ 978.180091] ? __pfx___do_sys_clone3+0x10/0x10 [ 978.180138] ? __fget_files+0x20d/0x3b0 [ 978.180179] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.180219] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.180259] ? ksys_write+0x1a3/0x240 [ 978.180295] ? __pfx_ksys_write+0x10/0x10 [ 978.180341] do_syscall_64+0xbf/0x3f0 [ 978.180374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.180399] RIP: 0033:0x7f4fcedb0b19 [ 978.180417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 978.180440] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 978.180464] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 978.180480] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 978.180495] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 978.180509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.180523] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 978.180555] [ 978.259283] FAULT_INJECTION: forcing a failure. [ 978.259283] name failslab, interval 1, probability 0, space 0, times 0 [ 978.261143] CPU: 1 UID: 0 PID: 17678 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 978.261174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 978.261188] Call Trace: [ 978.261196] [ 978.261205] dump_stack_lvl+0xfa/0x120 [ 978.261240] should_fail_ex+0x4d7/0x5e0 [ 978.261280] should_failslab+0xc2/0x120 [ 978.261320] __kmalloc_cache_noprof+0x81/0x6b0 [ 978.261346] ? __pfx_find_ucounts+0x10/0x10 [ 978.261374] ? __ns_tree_add_raw+0x5a3/0xd20 [ 978.261399] ? alloc_ucounts+0x13e/0x450 [ 978.261432] ? alloc_ucounts+0x13e/0x450 [ 978.261459] alloc_ucounts+0x13e/0x450 [ 978.261487] ? __pfx_alloc_ucounts+0x10/0x10 [ 978.261514] ? __ns_ref_active_get_owner+0x6f/0xe0 [ 978.261541] ? create_user_ns+0x143/0xd40 [ 978.261573] copy_creds+0x57e/0xa30 [ 978.261613] copy_process+0xf59/0x7420 [ 978.261642] ? __pfx__kstrtoull+0x10/0x10 [ 978.261680] ? __pfx_copy_process+0x10/0x10 [ 978.261709] ? __might_fault+0xe0/0x190 [ 978.261763] ? _copy_from_user+0x5b/0xd0 [ 978.261803] kernel_clone+0xea/0x7f0 [ 978.261831] ? get_pid_task+0xfd/0x250 [ 978.261860] ? __pfx_kernel_clone+0x10/0x10 [ 978.261897] ? find_held_lock+0x2b/0x80 [ 978.261923] ? ksys_write+0x121/0x240 [ 978.261959] ? lock_is_held_type+0x9e/0x120 [ 978.261989] __do_sys_clone3+0x1f5/0x280 [ 978.262019] ? __pfx___do_sys_clone3+0x10/0x10 [ 978.262064] ? __fget_files+0x20d/0x3b0 [ 978.262104] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.262143] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.262182] ? ksys_write+0x1a3/0x240 [ 978.262216] ? __pfx_ksys_write+0x10/0x10 [ 978.262261] do_syscall_64+0xbf/0x3f0 [ 978.262293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.262316] RIP: 0033:0x7ff7debb3b19 [ 978.262334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 978.262356] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 978.262379] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 978.262395] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 978.262409] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 978.262423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.262437] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 978.262467] 10:57:47 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 10:57:47 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 10:57:47 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) [ 978.363484] FAULT_INJECTION: forcing a failure. [ 978.363484] name failslab, interval 1, probability 0, space 0, times 0 [ 978.365835] CPU: 0 UID: 0 PID: 17711 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 978.365871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 978.365886] Call Trace: [ 978.365894] [ 978.365904] dump_stack_lvl+0xfa/0x120 [ 978.365944] should_fail_ex+0x4d7/0x5e0 [ 978.365987] should_failslab+0xc2/0x120 [ 978.366031] __kmalloc_cache_noprof+0x81/0x6b0 [ 978.366063] ? alloc_fdtable+0x9e/0x2d0 [ 978.366105] ? alloc_fdtable+0x9e/0x2d0 [ 978.366139] alloc_fdtable+0x9e/0x2d0 [ 978.366175] dup_fd+0x6ef/0xa80 [ 978.366220] copy_process+0x21c4/0x7420 [ 978.366253] ? __pfx__kstrtoull+0x10/0x10 [ 978.366295] ? __pfx_copy_process+0x10/0x10 [ 978.366329] ? __might_fault+0xe0/0x190 [ 978.366370] ? _copy_from_user+0x5b/0xd0 [ 978.366414] kernel_clone+0xea/0x7f0 [ 978.366446] ? get_pid_task+0xfd/0x250 [ 978.366478] ? __pfx_kernel_clone+0x10/0x10 [ 978.366520] ? find_held_lock+0x2b/0x80 [ 978.366549] ? ksys_write+0x121/0x240 [ 978.366589] ? lock_is_held_type+0x9e/0x120 [ 978.366622] __do_sys_clone3+0x1f5/0x280 [ 978.366655] ? __pfx___do_sys_clone3+0x10/0x10 [ 978.366706] ? __fget_files+0x20d/0x3b0 [ 978.366744] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.366787] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.366824] ? ksys_write+0x1a3/0x240 [ 978.366856] ? __pfx_ksys_write+0x10/0x10 [ 978.366898] do_syscall_64+0xbf/0x3f0 [ 978.366928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.366950] RIP: 0033:0x7fd4c7d14b19 [ 978.366968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 978.366988] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 978.367011] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 978.367025] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 978.367038] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 978.367051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.367064] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 978.367093] 10:57:47 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) waitid(0x1, r2, &(0x7f0000000100), 0x1, 0x0) r3 = fork() kcmp(r1, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:47 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) [ 978.481308] FAULT_INJECTION: forcing a failure. [ 978.481308] name failslab, interval 1, probability 0, space 0, times 0 [ 978.483102] CPU: 1 UID: 0 PID: 17786 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 978.483134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 978.483147] Call Trace: [ 978.483155] [ 978.483164] dump_stack_lvl+0xfa/0x120 [ 978.483200] should_fail_ex+0x4d7/0x5e0 [ 978.483241] should_failslab+0xc2/0x120 [ 978.483281] __kvmalloc_node_noprof+0x11f/0x770 [ 978.483317] ? alloc_fdtable+0xf2/0x2d0 [ 978.483356] ? alloc_fdtable+0xf2/0x2d0 [ 978.483385] alloc_fdtable+0xf2/0x2d0 [ 978.483418] dup_fd+0x6ef/0xa80 [ 978.483459] copy_process+0x21c4/0x7420 [ 978.483489] ? __pfx__kstrtoull+0x10/0x10 [ 978.483527] ? __pfx_copy_process+0x10/0x10 [ 978.483557] ? __might_fault+0xe0/0x190 [ 978.483595] ? _copy_from_user+0x5b/0xd0 [ 978.483634] kernel_clone+0xea/0x7f0 [ 978.483663] ? get_pid_task+0xfd/0x250 [ 978.483693] ? __pfx_kernel_clone+0x10/0x10 [ 978.483730] ? find_held_lock+0x2b/0x80 [ 978.483764] ? ksys_write+0x121/0x240 [ 978.483800] ? lock_is_held_type+0x9e/0x120 [ 978.483830] __do_sys_clone3+0x1f5/0x280 [ 978.483860] ? __pfx___do_sys_clone3+0x10/0x10 [ 978.483907] ? __fget_files+0x20d/0x3b0 [ 978.483947] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.483986] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 978.484026] ? ksys_write+0x1a3/0x240 [ 978.484061] ? __pfx_ksys_write+0x10/0x10 [ 978.484106] do_syscall_64+0xbf/0x3f0 [ 978.484139] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.484163] RIP: 0033:0x7f4fcedb0b19 [ 978.484181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 978.484203] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 978.484227] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 978.484243] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 978.484258] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 978.484272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.484286] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 978.484317] 10:57:57 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 10:57:57 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') pread64(r1, &(0x7f0000000040)=""/119, 0x77, 0x1) waitid$P_PIDFD(0x3, r1, &(0x7f0000000080), 0x40000008, &(0x7f0000000100)) pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) r3 = fork() kcmp(r2, r3, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:57 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 10:57:57 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 10:57:57 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:57 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:57:57 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 10:57:57 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) [ 988.654016] FAULT_INJECTION: forcing a failure. [ 988.654016] name failslab, interval 1, probability 0, space 0, times 0 [ 988.655090] CPU: 1 UID: 0 PID: 17907 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 988.655110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.655118] Call Trace: [ 988.655123] [ 988.655128] dump_stack_lvl+0xfa/0x120 [ 988.655153] should_fail_ex+0x4d7/0x5e0 [ 988.655175] should_failslab+0xc2/0x120 [ 988.655196] __kvmalloc_node_noprof+0x11f/0x770 [ 988.655216] ? alloc_fdtable+0xf2/0x2d0 [ 988.655237] ? alloc_fdtable+0xf2/0x2d0 [ 988.655251] alloc_fdtable+0xf2/0x2d0 [ 988.655268] dup_fd+0x6ef/0xa80 [ 988.655288] copy_process+0x21c4/0x7420 [ 988.655304] ? __pfx__kstrtoull+0x10/0x10 [ 988.655324] ? __pfx_copy_process+0x10/0x10 [ 988.655339] ? __might_fault+0xe0/0x190 [ 988.655359] ? _copy_from_user+0x5b/0xd0 [ 988.655380] kernel_clone+0xea/0x7f0 [ 988.655395] ? get_pid_task+0xfd/0x250 [ 988.655410] ? __pfx_kernel_clone+0x10/0x10 [ 988.655429] ? find_held_lock+0x2b/0x80 [ 988.655443] ? ksys_write+0x121/0x240 [ 988.655462] ? lock_is_held_type+0x9e/0x120 [ 988.655479] __do_sys_clone3+0x1f5/0x280 [ 988.655494] ? __pfx___do_sys_clone3+0x10/0x10 [ 988.655517] ? __fget_files+0x20d/0x3b0 [ 988.655536] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 988.655557] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 988.655576] ? ksys_write+0x1a3/0x240 [ 988.655593] ? __pfx_ksys_write+0x10/0x10 [ 988.655616] do_syscall_64+0xbf/0x3f0 [ 988.655634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.655647] RIP: 0033:0x7f17f1ef4b19 [ 988.655657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.655668] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 988.655680] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 988.655689] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 988.655696] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.655704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.655711] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 988.655726] [ 988.710407] FAULT_INJECTION: forcing a failure. [ 988.710407] name failslab, interval 1, probability 0, space 0, times 0 [ 988.712299] CPU: 0 UID: 0 PID: 17915 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 988.712331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.712346] Call Trace: [ 988.712354] [ 988.712363] dump_stack_lvl+0xfa/0x120 [ 988.712401] should_fail_ex+0x4d7/0x5e0 [ 988.712441] ? dup_fd+0x4d/0xa80 [ 988.712473] should_failslab+0xc2/0x120 [ 988.712513] kmem_cache_alloc_noprof+0x80/0x690 [ 988.712543] ? __pfx_avc_has_perm+0x10/0x10 [ 988.712574] ? dup_fd+0x4d/0xa80 [ 988.712605] dup_fd+0x4d/0xa80 [ 988.712645] copy_process+0x21c4/0x7420 [ 988.712675] ? __pfx__kstrtoull+0x10/0x10 [ 988.712714] ? __pfx_copy_process+0x10/0x10 [ 988.712744] ? __might_fault+0xe0/0x190 [ 988.712789] ? _copy_from_user+0x5b/0xd0 [ 988.712829] kernel_clone+0xea/0x7f0 [ 988.712857] ? get_pid_task+0xfd/0x250 [ 988.712887] ? __pfx_kernel_clone+0x10/0x10 [ 988.712924] ? find_held_lock+0x2b/0x80 [ 988.712951] ? ksys_write+0x121/0x240 [ 988.712987] ? lock_is_held_type+0x9e/0x120 [ 988.713018] __do_sys_clone3+0x1f5/0x280 [ 988.713047] ? __pfx___do_sys_clone3+0x10/0x10 [ 988.713094] ? __fget_files+0x20d/0x3b0 [ 988.713134] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 988.713173] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 988.713212] ? ksys_write+0x1a3/0x240 [ 988.713246] ? __pfx_ksys_write+0x10/0x10 [ 988.713291] do_syscall_64+0xbf/0x3f0 [ 988.713324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.713348] RIP: 0033:0x7ff7debb3b19 [ 988.713367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.713388] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 988.713412] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 988.713428] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 988.713442] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.713456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.713470] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 988.713501] [ 988.746132] FAULT_INJECTION: forcing a failure. [ 988.746132] name failslab, interval 1, probability 0, space 0, times 0 [ 988.747939] CPU: 0 UID: 0 PID: 17914 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 988.747969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.747983] Call Trace: [ 988.747990] [ 988.747998] dump_stack_lvl+0xfa/0x120 [ 988.748030] should_fail_ex+0x4d7/0x5e0 [ 988.748069] should_failslab+0xc2/0x120 [ 988.748109] __kvmalloc_node_noprof+0x11f/0x770 [ 988.748144] ? alloc_fdtable+0x163/0x2d0 [ 988.748182] ? alloc_fdtable+0x163/0x2d0 [ 988.748210] alloc_fdtable+0x163/0x2d0 [ 988.748243] dup_fd+0x6ef/0xa80 [ 988.748283] copy_process+0x21c4/0x7420 [ 988.748312] ? __pfx__kstrtoull+0x10/0x10 [ 988.748349] ? __pfx_copy_process+0x10/0x10 [ 988.748379] ? __might_fault+0xe0/0x190 [ 988.748415] ? _copy_from_user+0x5b/0xd0 [ 988.748454] kernel_clone+0xea/0x7f0 [ 988.748482] ? get_pid_task+0xfd/0x250 [ 988.748512] ? __pfx_kernel_clone+0x10/0x10 [ 988.748549] ? find_held_lock+0x2b/0x80 [ 988.748575] ? ksys_write+0x121/0x240 [ 988.748610] ? lock_is_held_type+0x9e/0x120 [ 988.748639] __do_sys_clone3+0x1f5/0x280 [ 988.748669] ? __pfx___do_sys_clone3+0x10/0x10 [ 988.748714] ? __fget_files+0x20d/0x3b0 [ 988.748761] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 988.748800] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 988.748839] ? ksys_write+0x1a3/0x240 [ 988.748873] ? __pfx_ksys_write+0x10/0x10 [ 988.748918] do_syscall_64+0xbf/0x3f0 [ 988.748950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.748973] RIP: 0033:0x7f4fcedb0b19 [ 988.748990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.749012] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 988.749034] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 988.749050] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 988.749064] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.749078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.749092] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 988.749122] 10:57:57 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 10:57:57 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 10:57:57 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 10:57:57 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 10:57:57 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 988.961589] FAULT_INJECTION: forcing a failure. [ 988.961589] name failslab, interval 1, probability 0, space 0, times 0 [ 988.963170] CPU: 1 UID: 0 PID: 18122 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 988.963199] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.963211] Call Trace: [ 988.963218] [ 988.963225] dump_stack_lvl+0xfa/0x120 [ 988.963256] should_fail_ex+0x4d7/0x5e0 [ 988.963289] should_failslab+0xc2/0x120 [ 988.963322] __kvmalloc_node_noprof+0x11f/0x770 [ 988.963353] ? alloc_fdtable+0x163/0x2d0 [ 988.963385] ? alloc_fdtable+0x163/0x2d0 [ 988.963409] alloc_fdtable+0x163/0x2d0 [ 988.963436] dup_fd+0x6ef/0xa80 [ 988.963471] copy_process+0x21c4/0x7420 [ 988.963496] ? __pfx__kstrtoull+0x10/0x10 [ 988.963528] ? __pfx_copy_process+0x10/0x10 [ 988.963552] ? __might_fault+0xe0/0x190 [ 988.963584] ? _copy_from_user+0x5b/0xd0 [ 988.963616] kernel_clone+0xea/0x7f0 [ 988.963640] ? get_pid_task+0xfd/0x250 [ 988.963665] ? __pfx_kernel_clone+0x10/0x10 [ 988.963696] ? find_held_lock+0x2b/0x80 [ 988.963718] ? ksys_write+0x121/0x240 [ 988.963748] ? lock_is_held_type+0x9e/0x120 [ 988.963780] __do_sys_clone3+0x1f5/0x280 [ 988.963805] ? __pfx___do_sys_clone3+0x10/0x10 [ 988.963846] ? irqentry_exit+0x3b/0x90 [ 988.963867] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 988.963915] do_syscall_64+0xbf/0x3f0 [ 988.963942] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 988.963962] RIP: 0033:0x7f5814920b19 [ 988.963977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.963996] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 988.964015] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 988.964029] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 988.964041] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.964053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 988.964065] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 988.964090] 10:57:57 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r1 = pidfd_open(r0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000280)={0x0, 0x0, "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", "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"}) r2 = fork() tkill(r2, 0x41) r3 = fork() tkill(r3, 0x31) ptrace(0x8, r3) r4 = fork() ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r6 = fork() tkill(r6, 0x31) ptrace$setregs(0xf, r6, 0x401, &(0x7f0000000180)="d8098cdb99cbf4500c616cd13415dadf5229d4cd53ff0acde9dda0a0ad4f242c1a9126743539") ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000140)={r7, 0x2, r1, 0x4}) kcmp(r2, r4, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:57 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 10:57:57 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 989.172557] FAULT_INJECTION: forcing a failure. [ 989.172557] name failslab, interval 1, probability 0, space 0, times 0 [ 989.174317] CPU: 0 UID: 0 PID: 18137 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 989.174350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.174364] Call Trace: [ 989.174372] [ 989.174381] dump_stack_lvl+0xfa/0x120 [ 989.174419] should_fail_ex+0x4d7/0x5e0 [ 989.174460] should_failslab+0xc2/0x120 [ 989.174501] __kvmalloc_node_noprof+0x11f/0x770 [ 989.174538] ? alloc_fdtable+0xf2/0x2d0 [ 989.174576] ? alloc_fdtable+0xf2/0x2d0 [ 989.174605] alloc_fdtable+0xf2/0x2d0 [ 989.174638] dup_fd+0x6ef/0xa80 [ 989.174678] copy_process+0x21c4/0x7420 [ 989.174708] ? __pfx__kstrtoull+0x10/0x10 [ 989.174746] ? __pfx_copy_process+0x10/0x10 [ 989.174784] ? __might_fault+0xe0/0x190 [ 989.174821] ? _copy_from_user+0x5b/0xd0 [ 989.174861] kernel_clone+0xea/0x7f0 [ 989.174889] ? get_pid_task+0xfd/0x250 [ 989.174919] ? __pfx_kernel_clone+0x10/0x10 [ 989.174957] ? find_held_lock+0x2b/0x80 [ 989.174983] ? ksys_write+0x121/0x240 [ 989.175019] ? lock_is_held_type+0x9e/0x120 [ 989.175050] __do_sys_clone3+0x1f5/0x280 [ 989.175079] ? __pfx___do_sys_clone3+0x10/0x10 [ 989.175124] ? __fget_files+0x20d/0x3b0 [ 989.175164] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.175203] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.175243] ? ksys_write+0x1a3/0x240 [ 989.175278] ? __pfx_ksys_write+0x10/0x10 [ 989.175322] do_syscall_64+0xbf/0x3f0 [ 989.175355] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.175379] RIP: 0033:0x7fd4c7d14b19 [ 989.175398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.175420] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 989.175443] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 989.175459] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 989.175473] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.175487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.175501] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 989.175531] 10:57:58 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) [ 989.262352] FAULT_INJECTION: forcing a failure. [ 989.262352] name failslab, interval 1, probability 0, space 0, times 0 [ 989.263823] CPU: 1 UID: 0 PID: 18164 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 989.263847] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.263858] Call Trace: [ 989.263865] [ 989.263872] dump_stack_lvl+0xfa/0x120 [ 989.263901] should_fail_ex+0x4d7/0x5e0 [ 989.263937] ? copy_process+0x2325/0x7420 [ 989.263960] should_failslab+0xc2/0x120 [ 989.263990] kmem_cache_alloc_noprof+0x80/0x690 [ 989.264012] ? do_raw_spin_unlock+0x53/0x220 [ 989.264035] ? copy_process+0x2325/0x7420 [ 989.264057] copy_process+0x2325/0x7420 [ 989.264078] ? __pfx__kstrtoull+0x10/0x10 [ 989.264108] ? __pfx_copy_process+0x10/0x10 [ 989.264131] ? __might_fault+0xe0/0x190 [ 989.264160] ? _copy_from_user+0x5b/0xd0 [ 989.264190] kernel_clone+0xea/0x7f0 [ 989.264212] ? get_pid_task+0xfd/0x250 [ 989.264235] ? __pfx_kernel_clone+0x10/0x10 [ 989.264263] ? find_held_lock+0x2b/0x80 [ 989.264283] ? ksys_write+0x121/0x240 [ 989.264311] ? lock_is_held_type+0x9e/0x120 [ 989.264334] __do_sys_clone3+0x1f5/0x280 [ 989.264357] ? __pfx___do_sys_clone3+0x10/0x10 [ 989.264392] ? __fget_files+0x20d/0x3b0 [ 989.264424] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.264453] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.264484] ? ksys_write+0x1a3/0x240 [ 989.264510] ? __pfx_ksys_write+0x10/0x10 [ 989.264545] do_syscall_64+0xbf/0x3f0 [ 989.264570] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.264589] RIP: 0033:0x7f5814920b19 [ 989.264603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.264620] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 989.264638] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 989.264650] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 989.264661] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.264672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.264682] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 989.264706] 10:57:58 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) [ 989.327169] FAULT_INJECTION: forcing a failure. [ 989.327169] name failslab, interval 1, probability 0, space 0, times 0 [ 989.328616] CPU: 1 UID: 0 PID: 18196 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 989.328642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.328654] Call Trace: [ 989.328660] [ 989.328667] dump_stack_lvl+0xfa/0x120 [ 989.328696] should_fail_ex+0x4d7/0x5e0 [ 989.328729] should_failslab+0xc2/0x120 [ 989.328768] __kvmalloc_node_noprof+0x11f/0x770 [ 989.328799] ? alloc_fdtable+0x163/0x2d0 [ 989.328831] ? alloc_fdtable+0x163/0x2d0 [ 989.328856] alloc_fdtable+0x163/0x2d0 [ 989.328884] dup_fd+0x6ef/0xa80 [ 989.328918] copy_process+0x21c4/0x7420 [ 989.328943] ? __pfx__kstrtoull+0x10/0x10 [ 989.328976] ? __pfx_copy_process+0x10/0x10 [ 989.329001] ? __might_fault+0xe0/0x190 [ 989.329033] ? _copy_from_user+0x5b/0xd0 [ 989.329066] kernel_clone+0xea/0x7f0 [ 989.329090] ? get_pid_task+0xfd/0x250 [ 989.329115] ? __pfx_kernel_clone+0x10/0x10 [ 989.329147] ? find_held_lock+0x2b/0x80 [ 989.329169] ? ksys_write+0x121/0x240 [ 989.329198] ? lock_is_held_type+0x9e/0x120 [ 989.329224] __do_sys_clone3+0x1f5/0x280 [ 989.329249] ? __pfx___do_sys_clone3+0x10/0x10 [ 989.329288] ? __fget_files+0x20d/0x3b0 [ 989.329322] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.329354] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.329387] ? ksys_write+0x1a3/0x240 [ 989.329416] ? __pfx_ksys_write+0x10/0x10 [ 989.329454] do_syscall_64+0xbf/0x3f0 [ 989.329481] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.329501] RIP: 0033:0x7f17f1ef4b19 [ 989.329516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.329535] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 989.329554] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 989.329567] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 989.329579] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.329591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.329603] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 989.329629] 10:57:58 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 10:57:58 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 10:57:58 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 10:57:58 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) [ 989.589808] FAULT_INJECTION: forcing a failure. [ 989.589808] name failslab, interval 1, probability 0, space 0, times 0 [ 989.591238] CPU: 1 UID: 0 PID: 18255 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 989.591261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.591271] Call Trace: [ 989.591277] [ 989.591283] dump_stack_lvl+0xfa/0x120 [ 989.591310] should_fail_ex+0x4d7/0x5e0 [ 989.591339] should_failslab+0xc2/0x120 [ 989.591368] __kmalloc_cache_noprof+0x81/0x6b0 [ 989.591388] ? alloc_fdtable+0x9e/0x2d0 [ 989.591415] ? alloc_fdtable+0x9e/0x2d0 [ 989.591436] alloc_fdtable+0x9e/0x2d0 [ 989.591459] dup_fd+0x6ef/0xa80 [ 989.591487] copy_process+0x21c4/0x7420 [ 989.591508] ? __pfx__kstrtoull+0x10/0x10 [ 989.591534] ? __pfx_copy_process+0x10/0x10 [ 989.591555] ? __might_fault+0xe0/0x190 [ 989.591583] ? _copy_from_user+0x5b/0xd0 [ 989.591611] kernel_clone+0xea/0x7f0 [ 989.591630] ? get_pid_task+0xfd/0x250 [ 989.591651] ? __pfx_kernel_clone+0x10/0x10 [ 989.591677] ? find_held_lock+0x2b/0x80 [ 989.591696] ? ksys_write+0x121/0x240 [ 989.591720] ? lock_is_held_type+0x9e/0x120 [ 989.591742] __do_sys_clone3+0x1f5/0x280 [ 989.591771] ? __pfx___do_sys_clone3+0x10/0x10 [ 989.591802] ? __fget_files+0x20d/0x3b0 [ 989.591830] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.591857] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.591885] ? ksys_write+0x1a3/0x240 [ 989.591909] ? __pfx_ksys_write+0x10/0x10 [ 989.591940] do_syscall_64+0xbf/0x3f0 [ 989.591964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.591981] RIP: 0033:0x7ff7debb3b19 [ 989.591994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.592009] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 989.592026] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 989.592037] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 989.592047] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.592057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.592066] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 989.592088] [ 989.597650] FAULT_INJECTION: forcing a failure. [ 989.597650] name failslab, interval 1, probability 0, space 0, times 0 [ 989.629440] CPU: 0 UID: 0 PID: 18257 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 989.629475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.629490] Call Trace: [ 989.629498] [ 989.629508] dump_stack_lvl+0xfa/0x120 [ 989.629546] should_fail_ex+0x4d7/0x5e0 [ 989.629586] ? copy_fs_struct+0x49/0x350 [ 989.629609] should_failslab+0xc2/0x120 [ 989.629649] kmem_cache_alloc_noprof+0x80/0x690 [ 989.629679] ? do_raw_spin_unlock+0x53/0x220 [ 989.629703] ? __asan_memset+0x24/0x50 [ 989.629743] ? copy_fs_struct+0x49/0x350 [ 989.629770] copy_fs_struct+0x49/0x350 [ 989.629796] copy_process+0x303c/0x7420 [ 989.629826] ? __pfx__kstrtoull+0x10/0x10 [ 989.629864] ? __pfx_copy_process+0x10/0x10 [ 989.629905] ? __might_fault+0xe0/0x190 [ 989.629943] ? _copy_from_user+0x5b/0xd0 [ 989.629984] kernel_clone+0xea/0x7f0 [ 989.630012] ? get_pid_task+0xfd/0x250 [ 989.630042] ? __pfx_kernel_clone+0x10/0x10 [ 989.630080] ? find_held_lock+0x2b/0x80 [ 989.630106] ? ksys_write+0x121/0x240 [ 989.630143] ? lock_is_held_type+0x9e/0x120 [ 989.630174] __do_sys_clone3+0x1f5/0x280 [ 989.630205] ? __pfx___do_sys_clone3+0x10/0x10 [ 989.630251] ? __fget_files+0x20d/0x3b0 [ 989.630292] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.630331] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 989.630372] ? ksys_write+0x1a3/0x240 [ 989.630407] ? __pfx_ksys_write+0x10/0x10 [ 989.630453] do_syscall_64+0xbf/0x3f0 [ 989.630486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 989.630511] RIP: 0033:0x7f4fcedb0b19 [ 989.630530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.630552] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 989.630577] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 989.630593] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 989.630607] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.630621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 989.630635] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 989.630667] 10:58:10 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) 10:58:10 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 10:58:10 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:10 executing program 4: r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) waitid(0x2, r1, &(0x7f0000000000), 0x80000000, &(0x7f0000000280)) r2 = fork() tkill(r2, 0x31) getpgid(r2) waitid(0x1, r0, &(0x7f0000000080), 0x2, &(0x7f0000000100)) pidfd_open(r0, 0x0) r3 = fork() tkill(r3, 0x31) r4 = fork() kcmp(r3, r4, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:10 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 10:58:10 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 10:58:10 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 10:58:10 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 1001.293034] FAULT_INJECTION: forcing a failure. [ 1001.293034] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.294893] CPU: 1 UID: 0 PID: 18274 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1001.294924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1001.294937] Call Trace: [ 1001.294944] [ 1001.294954] dump_stack_lvl+0xfa/0x120 [ 1001.294991] should_fail_ex+0x4d7/0x5e0 [ 1001.295028] should_failslab+0xc2/0x120 [ 1001.295065] __kvmalloc_node_noprof+0x11f/0x770 [ 1001.295101] ? alloc_fdtable+0x163/0x2d0 [ 1001.295137] ? alloc_fdtable+0x163/0x2d0 [ 1001.295164] alloc_fdtable+0x163/0x2d0 [ 1001.295194] dup_fd+0x6ef/0xa80 [ 1001.295231] copy_process+0x21c4/0x7420 [ 1001.295259] ? __pfx__kstrtoull+0x10/0x10 [ 1001.295295] ? __pfx_copy_process+0x10/0x10 [ 1001.295322] ? __might_fault+0xe0/0x190 [ 1001.295357] ? _copy_from_user+0x5b/0xd0 [ 1001.295394] kernel_clone+0xea/0x7f0 [ 1001.295421] ? get_pid_task+0xfd/0x250 [ 1001.295449] ? __pfx_kernel_clone+0x10/0x10 [ 1001.295484] ? find_held_lock+0x2b/0x80 [ 1001.295508] ? ksys_write+0x121/0x240 [ 1001.295542] ? lock_is_held_type+0x9e/0x120 [ 1001.295570] __do_sys_clone3+0x1f5/0x280 [ 1001.295597] ? __pfx___do_sys_clone3+0x10/0x10 [ 1001.295640] ? __fget_files+0x20d/0x3b0 [ 1001.295677] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1001.295713] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1001.295749] ? ksys_write+0x1a3/0x240 [ 1001.295789] ? __pfx_ksys_write+0x10/0x10 [ 1001.295830] do_syscall_64+0xbf/0x3f0 [ 1001.295861] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1001.295883] RIP: 0033:0x7fd4c7d14b19 [ 1001.295900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.295920] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1001.295942] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 1001.295959] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1001.295974] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.295988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1001.296001] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 1001.296030] [ 1001.329449] FAULT_INJECTION: forcing a failure. [ 1001.329449] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.331228] CPU: 1 UID: 0 PID: 18273 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1001.331256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1001.331268] Call Trace: [ 1001.331275] [ 1001.331282] dump_stack_lvl+0xfa/0x120 [ 1001.331310] should_fail_ex+0x4d7/0x5e0 [ 1001.331345] ? copy_process+0x5a64/0x7420 [ 1001.331371] should_failslab+0xc2/0x120 [ 1001.331406] kmem_cache_alloc_noprof+0x80/0x690 [ 1001.331431] ? copy_process+0x2456/0x7420 [ 1001.331464] ? copy_process+0x5a64/0x7420 [ 1001.331490] copy_process+0x5a64/0x7420 [ 1001.331516] ? __pfx__kstrtoull+0x10/0x10 [ 1001.331550] ? __pfx_copy_process+0x10/0x10 [ 1001.331578] ? __might_fault+0xe0/0x190 [ 1001.331611] ? _copy_from_user+0x5b/0xd0 [ 1001.331647] kernel_clone+0xea/0x7f0 [ 1001.331674] ? get_pid_task+0xfd/0x250 [ 1001.331700] ? __pfx_kernel_clone+0x10/0x10 [ 1001.331735] ? find_held_lock+0x2b/0x80 [ 1001.331765] ? ksys_write+0x121/0x240 [ 1001.331798] ? lock_is_held_type+0x9e/0x120 [ 1001.331825] __do_sys_clone3+0x1f5/0x280 [ 1001.331852] ? __pfx___do_sys_clone3+0x10/0x10 [ 1001.331895] ? __fget_files+0x20d/0x3b0 [ 1001.331932] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1001.331967] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1001.332003] ? ksys_write+0x1a3/0x240 [ 1001.332038] ? __pfx_ksys_write+0x10/0x10 [ 1001.332081] do_syscall_64+0xbf/0x3f0 [ 1001.332111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1001.332132] RIP: 0033:0x7f5814920b19 [ 1001.332148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.332168] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1001.332189] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 1001.332203] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1001.332216] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.332230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1001.332242] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 1001.332271] 10:58:10 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 10:58:10 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 10:58:10 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:10 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) ptrace(0x4208, r0) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:10 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) [ 1001.731917] FAULT_INJECTION: forcing a failure. [ 1001.731917] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.733555] CPU: 1 UID: 0 PID: 18398 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1001.733582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1001.733595] Call Trace: [ 1001.733601] [ 1001.733609] dump_stack_lvl+0xfa/0x120 [ 1001.733641] should_fail_ex+0x4d7/0x5e0 [ 1001.733676] ? copy_process+0x2325/0x7420 [ 1001.733702] should_failslab+0xc2/0x120 [ 1001.733739] kmem_cache_alloc_noprof+0x80/0x690 [ 1001.733772] ? do_raw_spin_unlock+0x53/0x220 [ 1001.733806] ? copy_process+0x2325/0x7420 [ 1001.733830] copy_process+0x2325/0x7420 [ 1001.733855] ? __pfx__kstrtoull+0x10/0x10 [ 1001.733888] ? __pfx_copy_process+0x10/0x10 [ 1001.733914] ? __might_fault+0xe0/0x190 [ 1001.733947] ? _copy_from_user+0x5b/0xd0 [ 1001.733982] kernel_clone+0xea/0x7f0 [ 1001.734016] ? get_pid_task+0xfd/0x250 [ 1001.734041] ? __pfx_kernel_clone+0x10/0x10 [ 1001.734074] ? find_held_lock+0x2b/0x80 [ 1001.734097] ? ksys_write+0x121/0x240 [ 1001.734128] ? lock_is_held_type+0x9e/0x120 [ 1001.734155] __do_sys_clone3+0x1f5/0x280 [ 1001.734181] ? __pfx___do_sys_clone3+0x10/0x10 [ 1001.734221] ? __fget_files+0x20d/0x3b0 [ 1001.734257] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1001.734290] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1001.734325] ? ksys_write+0x1a3/0x240 [ 1001.734355] ? __pfx_ksys_write+0x10/0x10 [ 1001.734393] do_syscall_64+0xbf/0x3f0 [ 1001.734423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1001.734444] RIP: 0033:0x7f4fcedb0b19 [ 1001.734460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1001.734479] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1001.734500] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 1001.734514] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1001.734526] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.734538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1001.734550] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 1001.734576] 10:58:22 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 10:58:22 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 10:58:22 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) r1 = pidfd_open(r0, 0x0) r2 = fork() tkill(r2, 0x31) r3 = fork() r4 = fork() tkill(r4, 0x31) wait4(r4, &(0x7f0000000140), 0x1000004, &(0x7f0000000280)) ptrace(0x8, 0x0) kcmp(r2, r3, 0x5, r1, 0xffffffffffffffff) r5 = fork() tkill(r5, 0x31) waitid(0x0, r5, 0x0, 0x4, &(0x7f0000000080)) 10:58:22 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 10:58:22 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 10:58:22 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:22 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:22 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) [ 1013.501078] FAULT_INJECTION: forcing a failure. [ 1013.501078] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.502924] CPU: 0 UID: 0 PID: 18519 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1013.502953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.502968] Call Trace: [ 1013.502975] [ 1013.502985] dump_stack_lvl+0xfa/0x120 [ 1013.503021] should_fail_ex+0x4d7/0x5e0 [ 1013.503058] ? copy_fs_struct+0x49/0x350 [ 1013.503079] should_failslab+0xc2/0x120 [ 1013.503116] kmem_cache_alloc_noprof+0x80/0x690 [ 1013.503143] ? do_raw_spin_unlock+0x53/0x220 [ 1013.503165] ? __asan_memset+0x24/0x50 [ 1013.503201] ? copy_fs_struct+0x49/0x350 [ 1013.503220] copy_fs_struct+0x49/0x350 [ 1013.503244] copy_process+0x303c/0x7420 [ 1013.503272] ? __pfx__kstrtoull+0x10/0x10 [ 1013.503307] ? __pfx_copy_process+0x10/0x10 [ 1013.503335] ? __might_fault+0xe0/0x190 [ 1013.503370] ? _copy_from_user+0x5b/0xd0 [ 1013.503407] kernel_clone+0xea/0x7f0 [ 1013.503434] ? get_pid_task+0xfd/0x250 [ 1013.503461] ? __pfx_kernel_clone+0x10/0x10 [ 1013.503496] ? find_held_lock+0x2b/0x80 [ 1013.503520] ? ksys_write+0x121/0x240 [ 1013.503554] ? lock_is_held_type+0x9e/0x120 [ 1013.503583] __do_sys_clone3+0x1f5/0x280 [ 1013.503610] ? __pfx___do_sys_clone3+0x10/0x10 [ 1013.503653] ? __fget_files+0x20d/0x3b0 [ 1013.503691] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1013.503727] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1013.503772] ? ksys_write+0x1a3/0x240 [ 1013.503804] ? __pfx_ksys_write+0x10/0x10 [ 1013.503846] do_syscall_64+0xbf/0x3f0 [ 1013.503876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1013.503899] RIP: 0033:0x7f17f1ef4b19 [ 1013.503916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.503937] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1013.503958] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 1013.503973] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1013.503986] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.504000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1013.504013] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 1013.504041] [ 1013.551068] FAULT_INJECTION: forcing a failure. [ 1013.551068] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.552943] CPU: 0 UID: 0 PID: 18526 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1013.552972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.552984] Call Trace: [ 1013.552991] [ 1013.552999] dump_stack_lvl+0xfa/0x120 [ 1013.553027] should_fail_ex+0x4d7/0x5e0 [ 1013.553062] ? copy_fs_struct+0x49/0x350 [ 1013.553081] should_failslab+0xc2/0x120 [ 1013.553116] kmem_cache_alloc_noprof+0x80/0x690 [ 1013.553142] ? do_raw_spin_unlock+0x53/0x220 [ 1013.553162] ? __asan_memset+0x24/0x50 [ 1013.553199] ? copy_fs_struct+0x49/0x350 [ 1013.553218] copy_fs_struct+0x49/0x350 [ 1013.553241] copy_process+0x303c/0x7420 [ 1013.553268] ? __pfx__kstrtoull+0x10/0x10 [ 1013.553303] ? __pfx_copy_process+0x10/0x10 [ 1013.553330] ? __might_fault+0xe0/0x190 [ 1013.553364] ? _copy_from_user+0x5b/0xd0 [ 1013.553401] kernel_clone+0xea/0x7f0 [ 1013.553427] ? get_pid_task+0xfd/0x250 [ 1013.553453] ? __pfx_kernel_clone+0x10/0x10 [ 1013.553488] ? find_held_lock+0x2b/0x80 [ 1013.553512] ? ksys_write+0x121/0x240 [ 1013.553544] ? lock_is_held_type+0x9e/0x120 [ 1013.553571] __do_sys_clone3+0x1f5/0x280 [ 1013.553598] ? __pfx___do_sys_clone3+0x10/0x10 [ 1013.553641] ? __fget_files+0x20d/0x3b0 [ 1013.553678] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1013.553713] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1013.553757] ? ksys_write+0x1a3/0x240 [ 1013.553789] ? __pfx_ksys_write+0x10/0x10 [ 1013.553831] do_syscall_64+0xbf/0x3f0 [ 1013.553860] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1013.553882] RIP: 0033:0x7fd4c7d14b19 [ 1013.553898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.553918] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1013.553939] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 1013.553953] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1013.553966] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.553979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1013.553992] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 1013.554020] 10:58:22 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 10:58:22 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 10:58:22 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) 10:58:22 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:22 executing program 4: r0 = getpid() ptrace(0x4207, r0) waitid(0x1, r0, &(0x7f0000000000), 0xc1000002, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x36) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:22 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 1013.860827] FAULT_INJECTION: forcing a failure. [ 1013.860827] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.862223] CPU: 1 UID: 0 PID: 18639 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1013.862246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.862256] Call Trace: [ 1013.862262] [ 1013.862268] dump_stack_lvl+0xfa/0x120 [ 1013.862298] should_fail_ex+0x4d7/0x5e0 [ 1013.862327] ? copy_process+0x5a64/0x7420 [ 1013.862348] should_failslab+0xc2/0x120 [ 1013.862382] kmem_cache_alloc_noprof+0x80/0x690 [ 1013.862402] ? copy_process+0x2456/0x7420 [ 1013.862427] ? copy_process+0x5a64/0x7420 [ 1013.862447] copy_process+0x5a64/0x7420 [ 1013.862467] ? __pfx__kstrtoull+0x10/0x10 [ 1013.862495] ? __pfx_copy_process+0x10/0x10 [ 1013.862516] ? __might_fault+0xe0/0x190 [ 1013.862543] ? _copy_from_user+0x5b/0xd0 [ 1013.862571] kernel_clone+0xea/0x7f0 [ 1013.862591] ? get_pid_task+0xfd/0x250 [ 1013.862613] ? __pfx_kernel_clone+0x10/0x10 [ 1013.862639] ? find_held_lock+0x2b/0x80 [ 1013.862662] ? ksys_write+0x121/0x240 [ 1013.862690] ? lock_is_held_type+0x9e/0x120 [ 1013.862712] __do_sys_clone3+0x1f5/0x280 [ 1013.862733] ? __pfx___do_sys_clone3+0x10/0x10 [ 1013.862770] ? __fget_files+0x20d/0x3b0 [ 1013.862800] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1013.862828] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1013.862856] ? ksys_write+0x1a3/0x240 [ 1013.862881] ? __pfx_ksys_write+0x10/0x10 [ 1013.862912] do_syscall_64+0xbf/0x3f0 [ 1013.862935] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1013.862953] RIP: 0033:0x7f4fcedb0b19 [ 1013.862966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.862982] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1013.862999] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 1013.863011] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1013.863021] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1013.863031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1013.863041] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 1013.863063] 10:58:22 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 10:58:22 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 10:58:22 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) [ 1014.026279] FAULT_INJECTION: forcing a failure. [ 1014.026279] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.027521] CPU: 1 UID: 0 PID: 18654 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1014.027543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.027554] Call Trace: [ 1014.027559] [ 1014.027565] dump_stack_lvl+0xfa/0x120 [ 1014.027593] should_fail_ex+0x4d7/0x5e0 [ 1014.027620] ? create_new_namespaces+0x30/0xab0 [ 1014.027638] should_failslab+0xc2/0x120 [ 1014.027665] kmem_cache_alloc_noprof+0x80/0x690 [ 1014.027691] ? create_new_namespaces+0x30/0xab0 [ 1014.027706] create_new_namespaces+0x30/0xab0 [ 1014.027721] ? security_capable+0x2f/0x90 [ 1014.027753] copy_namespaces+0x45c/0x580 [ 1014.027770] copy_process+0x26e4/0x7420 [ 1014.027791] ? __pfx__kstrtoull+0x10/0x10 [ 1014.027817] ? __pfx_copy_process+0x10/0x10 [ 1014.027837] ? __might_fault+0xe0/0x190 [ 1014.027863] ? _copy_from_user+0x5b/0xd0 [ 1014.027890] kernel_clone+0xea/0x7f0 [ 1014.027910] ? get_pid_task+0xfd/0x250 [ 1014.027930] ? __pfx_kernel_clone+0x10/0x10 [ 1014.027955] ? find_held_lock+0x2b/0x80 [ 1014.027974] ? ksys_write+0x121/0x240 [ 1014.028000] ? lock_is_held_type+0x9e/0x120 [ 1014.028021] __do_sys_clone3+0x1f5/0x280 [ 1014.028045] ? __pfx___do_sys_clone3+0x10/0x10 [ 1014.028077] ? __fget_files+0x20d/0x3b0 [ 1014.028106] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.028135] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.028162] ? ksys_write+0x1a3/0x240 [ 1014.028186] ? __pfx_ksys_write+0x10/0x10 [ 1014.028217] do_syscall_64+0xbf/0x3f0 [ 1014.028241] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.028258] RIP: 0033:0x7f5814920b19 [ 1014.028270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.028285] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1014.028302] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 1014.028312] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1014.028322] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1014.028332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.028341] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 1014.028362] 10:58:22 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) [ 1014.143624] FAULT_INJECTION: forcing a failure. [ 1014.143624] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.145455] CPU: 0 UID: 0 PID: 18755 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1014.145485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.145498] Call Trace: [ 1014.145505] [ 1014.145513] dump_stack_lvl+0xfa/0x120 [ 1014.145547] should_fail_ex+0x4d7/0x5e0 [ 1014.145584] ? copy_process+0x2325/0x7420 [ 1014.145611] should_failslab+0xc2/0x120 [ 1014.145651] kmem_cache_alloc_noprof+0x80/0x690 [ 1014.145678] ? do_raw_spin_unlock+0x53/0x220 [ 1014.145706] ? copy_process+0x2325/0x7420 [ 1014.145732] copy_process+0x2325/0x7420 [ 1014.145765] ? __pfx__kstrtoull+0x10/0x10 [ 1014.145802] ? __pfx_copy_process+0x10/0x10 [ 1014.145829] ? __might_fault+0xe0/0x190 [ 1014.145865] ? _copy_from_user+0x5b/0xd0 [ 1014.145902] kernel_clone+0xea/0x7f0 [ 1014.145929] ? get_pid_task+0xfd/0x250 [ 1014.145956] ? __pfx_kernel_clone+0x10/0x10 [ 1014.145991] ? find_held_lock+0x2b/0x80 [ 1014.146016] ? ksys_write+0x121/0x240 [ 1014.146050] ? lock_is_held_type+0x9e/0x120 [ 1014.146078] __do_sys_clone3+0x1f5/0x280 [ 1014.146106] ? __pfx___do_sys_clone3+0x10/0x10 [ 1014.146159] ? __fget_files+0x20d/0x3b0 [ 1014.146198] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.146235] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.146271] ? ksys_write+0x1a3/0x240 [ 1014.146303] ? __pfx_ksys_write+0x10/0x10 [ 1014.146345] do_syscall_64+0xbf/0x3f0 [ 1014.146379] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.146401] RIP: 0033:0x7f4fcedb0b19 [ 1014.146418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.146438] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1014.146460] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 1014.146475] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1014.146488] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1014.146502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.146514] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 1014.146544] 10:58:23 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:23 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) [ 1014.224498] FAULT_INJECTION: forcing a failure. [ 1014.224498] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.225591] CPU: 1 UID: 0 PID: 18758 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1014.225609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.225618] Call Trace: [ 1014.225622] [ 1014.225627] dump_stack_lvl+0xfa/0x120 [ 1014.225650] should_fail_ex+0x4d7/0x5e0 [ 1014.225672] ? copy_process+0x2325/0x7420 [ 1014.225689] should_failslab+0xc2/0x120 [ 1014.225712] kmem_cache_alloc_noprof+0x80/0x690 [ 1014.225728] ? do_raw_spin_unlock+0x53/0x220 [ 1014.225745] ? copy_process+0x2325/0x7420 [ 1014.225764] copy_process+0x2325/0x7420 [ 1014.225780] ? __pfx__kstrtoull+0x10/0x10 [ 1014.225801] ? __pfx_copy_process+0x10/0x10 [ 1014.225818] ? __might_fault+0xe0/0x190 [ 1014.225839] ? _copy_from_user+0x5b/0xd0 [ 1014.225861] kernel_clone+0xea/0x7f0 [ 1014.225877] ? get_pid_task+0xfd/0x250 [ 1014.225893] ? __pfx_kernel_clone+0x10/0x10 [ 1014.225914] ? find_held_lock+0x2b/0x80 [ 1014.225928] ? ksys_write+0x121/0x240 [ 1014.225950] ? lock_is_held_type+0x9e/0x120 [ 1014.225967] __do_sys_clone3+0x1f5/0x280 [ 1014.225983] ? __pfx___do_sys_clone3+0x10/0x10 [ 1014.226008] ? __fget_files+0x20d/0x3b0 [ 1014.226031] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.226054] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.226075] ? ksys_write+0x1a3/0x240 [ 1014.226094] ? __pfx_ksys_write+0x10/0x10 [ 1014.226119] do_syscall_64+0xbf/0x3f0 [ 1014.226146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.226159] RIP: 0033:0x7fd4c7d14b19 [ 1014.226169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.226181] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1014.226194] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 1014.226203] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1014.226211] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1014.226219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.226226] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 1014.226243] [ 1014.256460] FAULT_INJECTION: forcing a failure. [ 1014.256460] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.257418] CPU: 1 UID: 0 PID: 18760 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1014.257434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.257442] Call Trace: [ 1014.257446] [ 1014.257450] dump_stack_lvl+0xfa/0x120 [ 1014.257467] should_fail_ex+0x4d7/0x5e0 [ 1014.257487] should_failslab+0xc2/0x120 [ 1014.257507] __kmalloc_cache_noprof+0x81/0x6b0 [ 1014.257521] ? __pfx_inc_ucount+0x10/0x10 [ 1014.257536] ? __create_object+0x59/0x80 [ 1014.257552] ? copy_ipcs+0x1a0/0x5c0 [ 1014.257567] ? copy_mnt_ns+0xac/0xac0 [ 1014.257590] ? copy_ipcs+0x1a0/0x5c0 [ 1014.257603] copy_ipcs+0x1a0/0x5c0 [ 1014.257619] create_new_namespaces+0x210/0xab0 [ 1014.257633] ? security_capable+0x2f/0x90 [ 1014.257653] copy_namespaces+0x45c/0x580 [ 1014.257667] copy_process+0x26e4/0x7420 [ 1014.257682] ? __pfx__kstrtoull+0x10/0x10 [ 1014.257701] ? __pfx_copy_process+0x10/0x10 [ 1014.257717] ? __might_fault+0xe0/0x190 [ 1014.257737] ? _copy_from_user+0x5b/0xd0 [ 1014.257763] kernel_clone+0xea/0x7f0 [ 1014.257778] ? get_pid_task+0xfd/0x250 [ 1014.257793] ? __pfx_kernel_clone+0x10/0x10 [ 1014.257814] ? find_held_lock+0x2b/0x80 [ 1014.257827] ? ksys_write+0x121/0x240 [ 1014.257847] ? lock_is_held_type+0x9e/0x120 [ 1014.257863] __do_sys_clone3+0x1f5/0x280 [ 1014.257880] ? __pfx___do_sys_clone3+0x10/0x10 [ 1014.257904] ? __fget_files+0x20d/0x3b0 [ 1014.257925] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.257945] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.257967] ? ksys_write+0x1a3/0x240 [ 1014.257985] ? __pfx_ksys_write+0x10/0x10 [ 1014.258009] do_syscall_64+0xbf/0x3f0 [ 1014.258026] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.258038] RIP: 0033:0x7f5814920b19 [ 1014.258048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.258059] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1014.258071] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 1014.258079] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 10:58:23 executing program 4: r0 = getpid() waitid(0x1, r0, &(0x7f0000000000), 0x2, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() pidfd_open(r0, 0x0) r3 = getpgrp(r1) ptrace(0x11, r3) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') pread64(r4, &(0x7f0000000040)=""/119, 0x77, 0x1) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x81, 0x20, 0x5f, 0x0, 0xfffffffffffffffa, 0x8c424, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x6c, 0x9}, 0x80, 0x1, 0x9, 0x8, 0x200, 0x61487355, 0x1000, 0x0, 0x9, 0x0, 0xffffffffffffff2d}, 0xffffffffffffffff, 0xb, r4, 0xe) kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) [ 1014.258087] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1014.258094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.258102] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 1014.258118] 10:58:23 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:23 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 10:58:23 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) [ 1014.413951] FAULT_INJECTION: forcing a failure. [ 1014.413951] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.415006] CPU: 1 UID: 0 PID: 18769 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1014.415023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.415031] Call Trace: [ 1014.415035] [ 1014.415039] dump_stack_lvl+0xfa/0x120 [ 1014.415062] should_fail_ex+0x4d7/0x5e0 [ 1014.415083] ? copy_fs_struct+0x49/0x350 [ 1014.415096] should_failslab+0xc2/0x120 [ 1014.415117] kmem_cache_alloc_noprof+0x80/0x690 [ 1014.415133] ? do_raw_spin_unlock+0x53/0x220 [ 1014.415146] ? __asan_memset+0x24/0x50 [ 1014.415166] ? copy_fs_struct+0x49/0x350 [ 1014.415176] copy_fs_struct+0x49/0x350 [ 1014.415189] copy_process+0x303c/0x7420 [ 1014.415204] ? __pfx__kstrtoull+0x10/0x10 [ 1014.415224] ? __pfx_copy_process+0x10/0x10 [ 1014.415239] ? __might_fault+0xe0/0x190 [ 1014.415259] ? _copy_from_user+0x5b/0xd0 [ 1014.415279] kernel_clone+0xea/0x7f0 [ 1014.415293] ? get_pid_task+0xfd/0x250 [ 1014.415309] ? __pfx_kernel_clone+0x10/0x10 [ 1014.415328] ? find_held_lock+0x2b/0x80 [ 1014.415341] ? ksys_write+0x121/0x240 [ 1014.415360] ? lock_is_held_type+0x9e/0x120 [ 1014.415376] __do_sys_clone3+0x1f5/0x280 [ 1014.415391] ? __pfx___do_sys_clone3+0x10/0x10 [ 1014.415414] ? __fget_files+0x20d/0x3b0 [ 1014.415435] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.415455] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.415475] ? ksys_write+0x1a3/0x240 [ 1014.415492] ? __pfx_ksys_write+0x10/0x10 [ 1014.415515] do_syscall_64+0xbf/0x3f0 [ 1014.415532] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.415544] RIP: 0033:0x7fd4c7d14b19 [ 1014.415554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.415565] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1014.415578] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 1014.415586] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1014.415593] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1014.415600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.415607] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 1014.415622] 10:58:34 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 10:58:34 executing program 4: r0 = getpid() waitid(0x0, r0, &(0x7f0000000000), 0x1, &(0x7f00000001c0)) pidfd_open(r0, 0x0) r1 = fork() tkill(r1, 0x31) r2 = fork() kcmp(r1, r2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:34 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:34 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) 10:58:34 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) 10:58:34 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) 10:58:34 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:34 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) [ 1025.470564] FAULT_INJECTION: forcing a failure. [ 1025.470564] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.471665] CPU: 1 UID: 0 PID: 18887 Comm: syz-executor.2 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.471685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.471693] Call Trace: [ 1025.471698] [ 1025.471704] dump_stack_lvl+0xfa/0x120 [ 1025.471728] should_fail_ex+0x4d7/0x5e0 [ 1025.471760] should_failslab+0xc2/0x120 [ 1025.471793] __kmalloc_cache_noprof+0x81/0x6b0 [ 1025.471810] ? __pfx_ida_alloc_range+0x10/0x10 [ 1025.471827] ? alloc_fs_context+0x58/0x9e0 [ 1025.471851] ? alloc_fs_context+0x58/0x9e0 [ 1025.471870] alloc_fs_context+0x58/0x9e0 [ 1025.471890] ? __kmalloc_cache_noprof+0x27b/0x6b0 [ 1025.471908] mq_init_ns+0x172/0x630 [ 1025.471925] copy_ipcs+0x2dd/0x5c0 [ 1025.471942] create_new_namespaces+0x210/0xab0 [ 1025.471956] ? security_capable+0x2f/0x90 [ 1025.471978] copy_namespaces+0x45c/0x580 [ 1025.471993] copy_process+0x26e4/0x7420 [ 1025.472010] ? __pfx__kstrtoull+0x10/0x10 [ 1025.472032] ? __pfx_copy_process+0x10/0x10 [ 1025.472049] ? __might_fault+0xe0/0x190 [ 1025.472073] ? _copy_from_user+0x5b/0xd0 [ 1025.472096] kernel_clone+0xea/0x7f0 [ 1025.472112] ? get_pid_task+0xfd/0x250 [ 1025.472129] ? __pfx_kernel_clone+0x10/0x10 [ 1025.472151] ? find_held_lock+0x2b/0x80 [ 1025.472166] ? ksys_write+0x121/0x240 [ 1025.472187] ? lock_is_held_type+0x9e/0x120 [ 1025.472205] __do_sys_clone3+0x1f5/0x280 [ 1025.472222] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.472248] ? __fget_files+0x20d/0x3b0 [ 1025.472272] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.472294] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.472317] ? ksys_write+0x1a3/0x240 [ 1025.472337] ? __pfx_ksys_write+0x10/0x10 [ 1025.472362] do_syscall_64+0xbf/0x3f0 [ 1025.472382] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1025.472396] RIP: 0033:0x7f5814920b19 [ 1025.472407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.472420] RSP: 002b:00007f5811e96188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.472434] RAX: ffffffffffffffda RBX: 00007f5814a33f60 RCX: 00007f5814920b19 [ 1025.472443] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.472452] RBP: 00007f5811e961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.472460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.472468] R13: 00007fffc5c0b8cf R14: 00007f5811e96300 R15: 0000000000022000 [ 1025.472485] [ 1025.503148] FAULT_INJECTION: forcing a failure. [ 1025.503148] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.504890] CPU: 0 UID: 0 PID: 18892 Comm: syz-executor.3 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.504921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.504934] Call Trace: [ 1025.504942] [ 1025.504950] dump_stack_lvl+0xfa/0x120 [ 1025.504985] should_fail_ex+0x4d7/0x5e0 [ 1025.505023] ? copy_process+0x2325/0x7420 [ 1025.505051] should_failslab+0xc2/0x120 [ 1025.505089] kmem_cache_alloc_noprof+0x80/0x690 [ 1025.505118] ? do_raw_spin_unlock+0x53/0x220 [ 1025.505146] ? copy_process+0x2325/0x7420 [ 1025.505173] copy_process+0x2325/0x7420 [ 1025.505199] ? __pfx__kstrtoull+0x10/0x10 [ 1025.505235] ? __pfx_copy_process+0x10/0x10 [ 1025.505263] ? __might_fault+0xe0/0x190 [ 1025.505299] ? _copy_from_user+0x5b/0xd0 [ 1025.505337] kernel_clone+0xea/0x7f0 [ 1025.505365] ? get_pid_task+0xfd/0x250 [ 1025.505394] ? __pfx_kernel_clone+0x10/0x10 [ 1025.505429] ? find_held_lock+0x2b/0x80 [ 1025.505454] ? ksys_write+0x121/0x240 [ 1025.505489] ? lock_is_held_type+0x9e/0x120 [ 1025.505518] __do_sys_clone3+0x1f5/0x280 [ 1025.505547] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.505590] ? __fget_files+0x20d/0x3b0 [ 1025.505629] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.505666] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.505702] ? ksys_write+0x1a3/0x240 [ 1025.505734] ? __pfx_ksys_write+0x10/0x10 [ 1025.505784] do_syscall_64+0xbf/0x3f0 [ 1025.505815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1025.505838] RIP: 0033:0x7f17f1ef4b19 [ 1025.505855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.505876] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.505897] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 1025.505912] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.505926] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.505939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.505951] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 1025.505980] [ 1025.507692] FAULT_INJECTION: forcing a failure. [ 1025.507692] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.509060] FAULT_INJECTION: forcing a failure. [ 1025.509060] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.509238] CPU: 1 UID: 0 PID: 18895 Comm: syz-executor.6 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.509257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.509265] Call Trace: [ 1025.509270] [ 1025.509275] dump_stack_lvl+0xfa/0x120 [ 1025.509294] should_fail_ex+0x4d7/0x5e0 [ 1025.509316] ? copy_process+0x5a64/0x7420 [ 1025.509333] should_failslab+0xc2/0x120 [ 1025.509356] kmem_cache_alloc_noprof+0x80/0x690 [ 1025.509372] ? copy_process+0x2456/0x7420 [ 1025.509392] ? copy_process+0x5a64/0x7420 [ 1025.509408] copy_process+0x5a64/0x7420 [ 1025.509423] ? __pfx__kstrtoull+0x10/0x10 [ 1025.509445] ? __pfx_copy_process+0x10/0x10 [ 1025.509462] ? __might_fault+0xe0/0x190 [ 1025.509482] ? _copy_from_user+0x5b/0xd0 [ 1025.509505] kernel_clone+0xea/0x7f0 [ 1025.509521] ? get_pid_task+0xfd/0x250 [ 1025.509538] ? __pfx_kernel_clone+0x10/0x10 [ 1025.509560] ? find_held_lock+0x2b/0x80 [ 1025.509574] ? ksys_write+0x121/0x240 [ 1025.509595] ? lock_is_held_type+0x9e/0x120 [ 1025.509615] __do_sys_clone3+0x1f5/0x280 [ 1025.509633] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.509659] ? __fget_files+0x20d/0x3b0 [ 1025.509681] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.509703] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.509726] ? ksys_write+0x1a3/0x240 [ 1025.509745] ? __pfx_ksys_write+0x10/0x10 [ 1025.509787] do_syscall_64+0xbf/0x3f0 [ 1025.509808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1025.509821] RIP: 0033:0x7fd4c7d14b19 [ 1025.509831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.509844] RSP: 002b:00007fd4c528a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.509857] RAX: ffffffffffffffda RBX: 00007fd4c7e27f60 RCX: 00007fd4c7d14b19 [ 1025.509866] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.509874] RBP: 00007fd4c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.509882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.509890] R13: 00007ffd2ca7aeef R14: 00007fd4c528a300 R15: 0000000000022000 [ 1025.509907] [ 1025.574472] CPU: 0 UID: 0 PID: 18894 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.574504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.574517] Call Trace: [ 1025.574524] [ 1025.574532] dump_stack_lvl+0xfa/0x120 [ 1025.574568] should_fail_ex+0x4d7/0x5e0 [ 1025.574605] ? create_new_namespaces+0x30/0xab0 [ 1025.574628] should_failslab+0xc2/0x120 [ 1025.574665] kmem_cache_alloc_noprof+0x80/0x690 [ 1025.574699] ? create_new_namespaces+0x30/0xab0 [ 1025.574719] create_new_namespaces+0x30/0xab0 [ 1025.574741] ? security_capable+0x2f/0x90 [ 1025.574783] copy_namespaces+0x45c/0x580 [ 1025.574806] copy_process+0x26e4/0x7420 [ 1025.574834] ? __pfx__kstrtoull+0x10/0x10 [ 1025.574870] ? __pfx_copy_process+0x10/0x10 [ 1025.574898] ? __might_fault+0xe0/0x190 [ 1025.574933] ? _copy_from_user+0x5b/0xd0 [ 1025.574970] kernel_clone+0xea/0x7f0 [ 1025.574996] ? get_pid_task+0xfd/0x250 [ 1025.575023] ? __pfx_kernel_clone+0x10/0x10 [ 1025.575058] ? find_held_lock+0x2b/0x80 [ 1025.575083] ? ksys_write+0x121/0x240 [ 1025.575117] ? lock_is_held_type+0x9e/0x120 [ 1025.575146] __do_sys_clone3+0x1f5/0x280 [ 1025.575173] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.575216] ? __fget_files+0x20d/0x3b0 [ 1025.575254] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.575291] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.575328] ? ksys_write+0x1a3/0x240 [ 1025.575360] ? __pfx_ksys_write+0x10/0x10 [ 1025.575401] do_syscall_64+0xbf/0x3f0 ** 1 printk messages dropped ** [ 1025.575454] RIP: 0033:0x7f4fcedb0b19 [ 1025.575474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.575495] RSP: 002b:00007f4fcc326188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.575518] RAX: ffffffffffffffda RBX: 00007f4fceec3f60 RCX: 00007f4fcedb0b19 [ 1025.575533] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.575546] RBP: 00007f4fcc3261d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.575559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.575572] R13: 00007ffe3796a80f R14: 00007f4fcc326300 R15: 0000000000022000 [ 1025.575601] [ 1025.580464] FAULT_INJECTION: forcing a failure. [ 1025.580464] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.590106] ------------[ cut here ]------------ [ 1025.590143] WARNING: kernel/printk/printk_ringbuffer.c:1278 at get_data+0x364/0x400, CPU#1: syz-executor.1/18898 [ 1025.590187] Modules linked in: [ 1025.590213] CPU: 1 UID: 0 PID: 18898 Comm: syz-executor.1 Not tainted 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.590232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.590241] RIP: 0010:get_data+0x364/0x400 [ 1025.590275] Code: e8 83 e0 07 83 c0 03 38 d0 0f 8c be fe ff ff 84 d2 0f 84 b6 fe ff ff 48 89 ef e8 d7 f1 5b 00 e9 a9 fe ff ff e8 3d f2 1e 00 90 <0f> 0b 90 45 31 e4 e9 3b ff ff ff e8 2c f2 1e 00 90 0f 0b 90 45 31 [ 1025.590289] RSP: 0018:ffff8880542471e0 EFLAGS: 00010216 [ 1025.590301] RAX: 00000000000063b5 RBX: ffff8880542472f8 RCX: ffffc9000229b000 [ 1025.590311] RDX: 0000000000040000 RSI: ffffffff81559633 RDI: 0000000000000006 [ 1025.590320] RBP: ffff8880542472c0 R08: 0000000000001184 R09: 000000eec90f3074 [ 1025.590330] R10: 0000000000000000 R11: 000049ce82000029 R12: ffffffff85d2e3d0 [ 1025.590339] R13: 00003fffffffffff R14: 0000000000000000 R15: 0000000000000000 [ 1025.590350] FS: 00007ff7dc129700(0000) GS:ffff8880e54a8000(0000) knlGS:0000000000000000 [ 1025.590363] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1025.590373] CR2: 00007f5814a30000 CR3: 00000000545ac000 CR4: 0000000000350ef0 [ 1025.590382] Call Trace: [ 1025.590386] [ 1025.590395] _prb_read_valid+0x2f3/0x830 [ 1025.590422] ? __pfx__prb_read_valid+0x10/0x10 [ 1025.590446] ? __asan_memcpy+0x3d/0x60 [ 1025.590470] ? __lock_acquire+0xc65/0x1b70 [ 1025.590494] prb_read_valid+0x78/0xa0 [ 1025.590515] ? __pfx_prb_read_valid+0x10/0x10 [ 1025.590537] ? io_serial_in+0x10/0x80 [ 1025.590561] printk_get_next_message+0x10b/0x570 [ 1025.590579] ? __pfx_printk_get_next_message+0x10/0x10 [ 1025.590594] ? __lock_acquire+0x694/0x1b70 [ 1025.590621] ? lock_acquire+0x15e/0x2f0 [ 1025.590640] ? console_flush_one_record+0x100/0xb20 [ 1025.590658] ? lock_is_held_type+0x9e/0x120 [ 1025.590677] console_flush_one_record+0x64f/0xb20 [ 1025.590696] ? __pfx_console_flush_one_record+0x10/0x10 [ 1025.590724] __console_flush_and_unlock+0xb1/0x1d0 [ 1025.590739] ? __pfx___console_flush_and_unlock+0x10/0x10 [ 1025.590796] ? is_printk_cpu_sync_owner+0x32/0x40 [ 1025.590821] ? is_printk_legacy_deferred+0x67/0x80 [ 1025.590841] vprintk_emit+0x4c1/0x690 [ 1025.590857] ? __pfx_vprintk_emit+0x10/0x10 [ 1025.590873] ? __lock_acquire+0x694/0x1b70 [ 1025.590893] ? find_held_lock+0x22/0x80 [ 1025.590912] _printk+0xbe/0xf0 [ 1025.590931] ? __pfx__printk+0x10/0x10 [ 1025.590950] ? __memcg_slab_post_alloc_hook+0x443/0x9e0 [ 1025.590973] ? ___ratelimit+0x465/0xa10 [ 1025.590993] should_fail_ex+0x4ac/0x5e0 [ 1025.591016] should_failslab+0xc2/0x120 [ 1025.591038] __kvmalloc_node_noprof+0x11f/0x770 [ 1025.591059] ? alloc_fdtable+0x163/0x2d0 [ 1025.591082] ? alloc_fdtable+0x163/0x2d0 [ 1025.591099] alloc_fdtable+0x163/0x2d0 [ 1025.591118] dup_fd+0x6ef/0xa80 [ 1025.591141] copy_process+0x21c4/0x7420 [ 1025.591158] ? __pfx__kstrtoull+0x10/0x10 [ 1025.591181] ? __pfx_copy_process+0x10/0x10 [ 1025.591198] ? __might_fault+0xe0/0x190 [ 1025.591220] ? _copy_from_user+0x5b/0xd0 [ 1025.591242] kernel_clone+0xea/0x7f0 [ 1025.591258] ? get_pid_task+0xfd/0x250 [ 1025.591276] ? __pfx_kernel_clone+0x10/0x10 [ 1025.591297] ? find_held_lock+0x2b/0x80 [ 1025.591312] ? ksys_write+0x121/0x240 [ 1025.591332] ? lock_is_held_type+0x9e/0x120 [ 1025.591350] __do_sys_clone3+0x1f5/0x280 [ 1025.591367] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.591393] ? __fget_files+0x20d/0x3b0 [ 1025.591416] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.591438] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.591460] ? ksys_write+0x1a3/0x240 [ 1025.591480] ? __pfx_ksys_write+0x10/0x10 [ 1025.591505] do_syscall_64+0xbf/0x3f0 [ 1025.591524] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1025.591538] RIP: 0033:0x7ff7debb3b19 [ 1025.591549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.591562] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.591576] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 1025.591585] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.591594] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.591602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.591611] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 1025.591629] [ 1025.591634] irq event stamp: 835 [ 1025.591639] hardirqs last enabled at (841): [] vprintk_emit+0x650/0x690 [ 1025.591657] hardirqs last disabled at (846): [] vprintk_emit+0x5e1/0x690 [ 1025.591675] softirqs last enabled at (304): [] handle_softirqs+0x50c/0x770 [ 1025.591692] softirqs last disabled at (299): [] __irq_exit_rcu+0xc4/0x100 [ 1025.591709] ---[ end trace 0000000000000000 ]--- [ 1025.644353] CPU: 1 UID: 0 PID: 18898 Comm: syz-executor.1 Tainted: G W 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.644374] Tainted: [W]=WARN [ 1025.644378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.644385] Call Trace: [ 1025.644390] [ 1025.644395] dump_stack_lvl+0xfa/0x120 [ 1025.644413] should_fail_ex+0x4d7/0x5e0 [ 1025.644433] should_failslab+0xc2/0x120 [ 1025.644454] __kvmalloc_node_noprof+0x11f/0x770 [ 1025.644473] ? alloc_fdtable+0x163/0x2d0 [ 1025.644493] ? alloc_fdtable+0x163/0x2d0 [ 1025.644509] alloc_fdtable+0x163/0x2d0 [ 1025.644526] dup_fd+0x6ef/0xa80 [ 1025.644548] copy_process+0x21c4/0x7420 [ 1025.644563] ? __pfx__kstrtoull+0x10/0x10 [ 1025.644584] ? __pfx_copy_process+0x10/0x10 [ 1025.644600] ? __might_fault+0xe0/0x190 [ 1025.644620] ? _copy_from_user+0x5b/0xd0 [ 1025.644642] kernel_clone+0xea/0x7f0 [ 1025.644657] ? get_pid_task+0xfd/0x250 [ 1025.644673] ? __pfx_kernel_clone+0x10/0x10 [ 1025.644693] ? find_held_lock+0x2b/0x80 [ 1025.644706] ? ksys_write+0x121/0x240 [ 1025.644725] ? lock_is_held_type+0x9e/0x120 [ 1025.644741] __do_sys_clone3+0x1f5/0x280 [ 1025.644766] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.644797] ? __fget_files+0x20d/0x3b0 [ 1025.644818] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.644840] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.644861] ? ksys_write+0x1a3/0x240 [ 1025.644880] ? __pfx_ksys_write+0x10/0x10 [ 1025.644904] do_syscall_64+0xbf/0x3f0 [ 1025.644922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1025.644935] RIP: 0033:0x7ff7debb3b19 [ 1025.644944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.644957] RSP: 002b:00007ff7dc129188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.644969] RAX: ffffffffffffffda RBX: 00007ff7decc6f60 RCX: 00007ff7debb3b19 [ 1025.644978] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.644985] RBP: 00007ff7dc1291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.644993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.645001] R13: 00007ffe30a9fc7f R14: 00007ff7dc129300 R15: 0000000000022000 [ 1025.645017] 10:58:34 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 10:58:34 executing program 6: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 10:58:34 executing program 2: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) 10:58:34 executing program 5: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x44, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) bind$inet6(r1, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e21, 0x5, @private1, 0xfffffff9}, 0x1c) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x20, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}, 0x15aa}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:34 executing program 1: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 10:58:34 executing program 0: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 10:58:34 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'broute\x00', 0x0, 0x3, 0x9b, [0x4, 0x8, 0x1, 0x73, 0x9, 0x2], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f0000000400)=""/155}, &(0x7f00000004c0)=0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0xfd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x9, 0x80000000000e2}, 0x4, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0xdae, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x86, 0x1, 0x9, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x3, 0x9}, 0xc040, 0x102, 0x7, 0x5, 0x80000000, 0x106, 0x101, 0x0, 0x7, 0x0, 0xc000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xe7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000002180)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x46, 0x0, "517d60a8dfa1273239320761b00773d2e8f22425183aa153e711c2d0dd3cc9d9f1c02db522d62e4c37b5657865e2021923d37da8da241753db27b862a5d8891bc0d0ae95046fc0b8bf7164a2d54af890"}, 0xd8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="db4d31d6805ecdac87307b14c169d9d9", 0x7ffff000}, {&(0x7f0000000200)="ee91b199cbde153a80cc89fff10933ca330cad7d5e0f004c6e6896c0909b95c3eebca1ddbf38aeb052c2cf7f3c5445bfa4c9cc966edb83bd3436a22c2a8e1cafade0533901774eb216d833be627e96c9a9c78fc0ad06be165d206fdd35dbde963942c7cb29ed300d6551b21ee9c57532", 0x70}], 0x2}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="ea", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000a00)='m', 0x1}], 0x1}}], 0x3, 0x44894) shutdown(0xffffffffffffffff, 0x1) shutdown(r0, 0x1) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x7}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 10:58:34 executing program 3: clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 1025.930485] FAULT_INJECTION: forcing a failure. [ 1025.930485] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.931491] CPU: 1 UID: 0 PID: 19021 Comm: syz-executor.3 Tainted: G W 6.18.0-rc4-next-20251104 #1 PREEMPT(voluntary) [ 1025.931512] Tainted: [W]=WARN [ 1025.931515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1025.931523] Call Trace: [ 1025.931528] [ 1025.931533] dump_stack_lvl+0xfa/0x120 [ 1025.931555] should_fail_ex+0x4d7/0x5e0 [ 1025.931576] ? copy_process+0x5a64/0x7420 [ 1025.931592] should_failslab+0xc2/0x120 [ 1025.931613] kmem_cache_alloc_noprof+0x80/0x690 [ 1025.931627] ? copy_process+0x2456/0x7420 [ 1025.931645] ? copy_process+0x5a64/0x7420 [ 1025.931659] copy_process+0x5a64/0x7420 [ 1025.931673] ? __pfx__kstrtoull+0x10/0x10 [ 1025.931693] ? __pfx_copy_process+0x10/0x10 [ 1025.931708] ? __might_fault+0xe0/0x190 [ 1025.931727] ? _copy_from_user+0x5b/0xd0 [ 1025.931753] kernel_clone+0xea/0x7f0 [ 1025.931773] ? get_pid_task+0xfd/0x250 [ 1025.931792] ? __pfx_kernel_clone+0x10/0x10 [ 1025.931811] ? find_held_lock+0x2b/0x80 [ 1025.931825] ? ksys_write+0x121/0x240 [ 1025.931844] ? lock_is_held_type+0x9e/0x120 [ 1025.931860] __do_sys_clone3+0x1f5/0x280 [ 1025.931875] ? __pfx___do_sys_clone3+0x10/0x10 [ 1025.931898] ? __fget_files+0x20d/0x3b0 [ 1025.931919] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.931939] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1025.931959] ? ksys_write+0x1a3/0x240 [ 1025.931976] ? __pfx_ksys_write+0x10/0x10 [ 1025.931998] do_syscall_64+0xbf/0x3f0 [ 1025.932015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1025.932028] RIP: 0033:0x7f17f1ef4b19 [ 1025.932038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1025.932049] RSP: 002b:00007f17ef46a188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1025.932062] RAX: ffffffffffffffda RBX: 00007f17f2007f60 RCX: 00007f17f1ef4b19 [ 1025.932070] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020005880 [ 1025.932078] RBP: 00007f17ef46a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1025.932085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1025.932092] R13: 00007ffeeadef11f R14: 00007f17ef46a300 R15: 0000000000022000 [ 1025.932108] VM DIAGNOSIS: 10:58:34 Registers: info registers vcpu 0 RAX=000000000048027b RBX=ffff88801e509520 RCX=ffff88800ef00240 RDX=000000000000000d RSI=00000000b503e55e RDI=ffffffff81000130 RBP=ffff8880139577d8 RSP=ffff888013957738 R8 =0000000060bf597b R9 =ffff88806c4eaae0 R10=0000000000000001 R11=0000000000000000 R12=0000000000000282 R13=0000000000000000 R14=ffff88805573b240 R15=ffffea000155cec0 RIP=ffffffff815cbfc4 RFL=00000082 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fdecd504700 00000000 00000000 GS =0000 ffff8880e53a8000 00000000 00000000 LDT=0000 fffffe5100000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020000000 CR3=0000000053d18000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8291c385 RDI=ffffffff8895a780 RBP=ffffffff8895a740 RSP=ffff888054247460 R8 =0000000000000000 R9 =ffffed10016fb046 R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=0000000000000010 R14=ffffffff8895a740 R15=ffffffff8291c370 RIP=ffffffff8291c3dd RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff7dc129700 00000000 00000000 GS =0000 ffff8880e54a8000 00000000 00000000 LDT=0000 fffffe7c00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5814a30000 CR3=00000000545ac000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f5814a077c000007f5814a077c8 XMM02=00007f5814a077e000007f5814a077c0 XMM03=00007f5814a077c800007f5814a077c0 XMM04=ffffffff0000ff00000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000