Warning: Permanently added '[localhost]:54732' (ECDSA) to the list of known hosts. 2020/08/02 12:40:38 fuzzer started 2020/08/02 12:40:39 dialing manager at 10.0.2.10:45173 2020/08/02 12:40:40 syscalls: 3262 2020/08/02 12:40:40 code coverage: enabled 2020/08/02 12:40:40 comparison tracing: enabled 2020/08/02 12:40:40 extra coverage: enabled 2020/08/02 12:40:40 setuid sandbox: enabled 2020/08/02 12:40:40 namespace sandbox: enabled 2020/08/02 12:40:40 Android sandbox: /sys/fs/selinux/policy does not exist 2020/08/02 12:40:40 fault injection: enabled 2020/08/02 12:40:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/08/02 12:40:40 net packet injection: enabled 2020/08/02 12:40:40 net device setup: enabled 2020/08/02 12:40:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/08/02 12:40:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/08/02 12:40:40 USB emulation: enabled 2020/08/02 12:40:40 hci packet injection: enabled 12:41:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd(0xffffffffffffffff, 0x0, 0x0) 12:41:44 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, 0x0) 12:41:45 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2f}}}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) syzkaller login: [ 285.189255][ T8737] IPVS: ftp: loaded support on port[0] = 21 [ 285.189323][ T8735] IPVS: ftp: loaded support on port[0] = 21 12:41:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 285.643228][ T8739] IPVS: ftp: loaded support on port[0] = 21 [ 285.821570][ T8737] chnl_net:caif_netlink_parms(): no params data found [ 285.894520][ T8735] chnl_net:caif_netlink_parms(): no params data found [ 285.940404][ T8742] IPVS: ftp: loaded support on port[0] = 21 [ 286.081034][ T8739] chnl_net:caif_netlink_parms(): no params data found [ 286.112711][ T8735] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.131508][ T8735] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.151941][ T8735] device bridge_slave_0 entered promiscuous mode [ 286.202883][ T8735] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.214462][ T8735] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.227765][ T8735] device bridge_slave_1 entered promiscuous mode [ 286.248224][ T8737] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.261052][ T8737] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.273875][ T8737] device bridge_slave_0 entered promiscuous mode [ 286.314680][ T8737] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.330221][ T8737] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.344372][ T8737] device bridge_slave_1 entered promiscuous mode [ 286.380911][ T8735] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 286.419491][ T8735] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 286.460670][ T8737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 286.491302][ T8737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 286.574687][ T8735] team0: Port device team_slave_0 added [ 286.591869][ T8737] team0: Port device team_slave_0 added [ 286.635287][ T8735] team0: Port device team_slave_1 added [ 286.650805][ T8737] team0: Port device team_slave_1 added [ 286.670195][ T8739] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.683683][ T8739] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.697145][ T8739] device bridge_slave_0 entered promiscuous mode [ 286.745364][ T8735] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 286.760354][ T8735] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 286.844254][ T8735] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 286.899785][ T8739] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.931963][ T8739] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.968262][ T8739] device bridge_slave_1 entered promiscuous mode [ 287.047071][ T8735] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 287.073129][ T8735] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 287.151408][ T8735] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 287.205234][ T8739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.233759][ T8737] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 287.259465][ T8737] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 287.341616][ T8737] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 287.384303][ T8737] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 287.404542][ T8737] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 287.482400][ T8737] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 287.523424][ T8739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.621837][ T8735] device hsr_slave_0 entered promiscuous mode [ 287.714076][ T8735] device hsr_slave_1 entered promiscuous mode [ 287.809921][ T8742] chnl_net:caif_netlink_parms(): no params data found [ 287.959304][ T8737] device hsr_slave_0 entered promiscuous mode [ 288.037292][ T8737] device hsr_slave_1 entered promiscuous mode [ 288.107021][ T8737] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 288.145870][ T8737] Cannot create hsr debugfs directory [ 288.169117][ T8739] team0: Port device team_slave_0 added [ 288.221530][ T8739] team0: Port device team_slave_1 added [ 288.278501][ T8739] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.306649][ T8739] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.381466][ T8739] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.415590][ T8739] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 288.442290][ T8739] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.515508][ T8739] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 288.563804][ T8742] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.582344][ T8742] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.602215][ T8742] device bridge_slave_0 entered promiscuous mode [ 288.651216][ T8742] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.673877][ T8742] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.700392][ T8742] device bridge_slave_1 entered promiscuous mode [ 288.850784][ T8739] device hsr_slave_0 entered promiscuous mode [ 288.937254][ T8739] device hsr_slave_1 entered promiscuous mode [ 289.017174][ T8739] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.055033][ T8739] Cannot create hsr debugfs directory [ 289.083412][ T8742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.153570][ T8742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.274581][ T8742] team0: Port device team_slave_0 added [ 289.333486][ T8742] team0: Port device team_slave_1 added [ 289.409399][ T8742] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 289.430308][ T8742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.513948][ T8742] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 289.551768][ T8742] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.574973][ T8742] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.642107][ T8742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.716217][ T8735] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 289.926192][ T8742] device hsr_slave_0 entered promiscuous mode [ 289.997122][ T8742] device hsr_slave_1 entered promiscuous mode [ 290.056598][ T8742] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 290.072835][ T8742] Cannot create hsr debugfs directory [ 290.091536][ T8735] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 290.152840][ T8735] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 290.263405][ T8735] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 290.426330][ T8737] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 290.535018][ T8737] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 290.653114][ T8737] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 290.783461][ T8737] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 290.959690][ T8739] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 291.036021][ T8739] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 291.113390][ T8739] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 291.220000][ T8739] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 291.389473][ T8742] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 291.501827][ T8742] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 291.580358][ T8742] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 291.661279][ T8742] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 291.899885][ T8735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.958375][ T8737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.002733][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.060869][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.125185][ T8735] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.170274][ T8739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.195543][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.228987][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.256776][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.273117][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.307854][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.332511][ T8737] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.370681][ T8742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.393157][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.416957][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.433895][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.449363][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.465280][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.478406][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.511133][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.528314][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.545059][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.570006][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.584619][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.597474][ T2859] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.607897][ T2859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.625361][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.651092][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.673860][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.692412][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.709381][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.727512][ T8739] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.749338][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 292.767772][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.791486][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.808879][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.830008][ T2887] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.842833][ T2887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.854884][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 292.870019][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.882472][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.896192][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.914089][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 292.949027][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.985065][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.008859][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.030961][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.054094][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.078997][ T59] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.095423][ T59] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.115886][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.143139][ T8742] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.168795][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.195251][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.222040][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.240817][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.259444][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.286993][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.321310][ T8735] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 293.354267][ T8735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 293.382657][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.403556][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.424957][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.447387][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.470193][ T8760] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.486735][ T8760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.510622][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.532577][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.556121][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.623246][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.663553][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.689939][ T8760] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.704759][ T8760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.727236][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.752290][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.782113][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.801691][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.822404][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.843802][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.867432][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.885549][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.902933][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.921154][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.945737][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 293.977708][ T8737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.015816][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.045328][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.065695][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.122274][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.154169][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.178967][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.210981][ T8735] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.270098][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.315710][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.348091][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.375107][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.404055][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.427639][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.458884][ T8737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.486060][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.505310][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.524325][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.541373][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.592150][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.624933][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.651882][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.679451][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.695521][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.714688][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.756414][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.774004][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.790268][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.805711][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.825483][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.838931][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.850392][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.863735][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.876467][ T8735] device veth0_vlan entered promiscuous mode [ 294.891374][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.902162][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.942436][ T8739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.962484][ T8742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.993989][ T8737] device veth0_vlan entered promiscuous mode [ 295.013586][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.029071][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.043757][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.059941][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.077163][ T8735] device veth1_vlan entered promiscuous mode [ 295.092313][ T8737] device veth1_vlan entered promiscuous mode [ 295.123983][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.144679][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.170271][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.183840][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.211462][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.224902][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.248777][ T8739] device veth0_vlan entered promiscuous mode [ 295.258911][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.272702][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.287860][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.304750][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.329026][ T8735] device veth0_macvtap entered promiscuous mode [ 295.352912][ T8737] device veth0_macvtap entered promiscuous mode [ 295.370583][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.388156][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.411503][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.439272][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.460165][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.511664][ T8742] device veth0_vlan entered promiscuous mode [ 295.544898][ T8739] device veth1_vlan entered promiscuous mode [ 295.591549][ T8735] device veth1_macvtap entered promiscuous mode [ 295.638395][ T8742] device veth1_vlan entered promiscuous mode [ 295.668079][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.707162][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.747353][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.774159][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.811242][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.854755][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.914194][ T8737] device veth1_macvtap entered promiscuous mode [ 295.952560][ T8735] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 296.018623][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 296.060788][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 296.085651][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.109925][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.133740][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.179124][ T8735] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 296.212901][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.239942][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.292949][ T8737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 296.328024][ T8737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.370389][ T8737] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 296.411547][ T8742] device veth0_macvtap entered promiscuous mode [ 296.432848][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.463101][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.487974][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.511193][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.534069][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.561816][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.595976][ T1230] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 296.753456][ T8739] device veth0_macvtap entered promiscuous mode [ 296.785322][ T8737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 296.811933][ T8737] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.841617][ T8737] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 296.969426][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 296.985298][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.009738][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.029075][ T8742] device veth1_macvtap entered promiscuous mode [ 297.059434][ T8739] device veth1_macvtap entered promiscuous mode [ 297.139751][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.161977][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.180886][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.200673][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.224337][ T8742] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.247881][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.270397][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.292441][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.320405][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.346072][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.375010][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.405770][ T8742] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.432453][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.449477][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.530913][ T8739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.553541][ T8739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.572549][ T8739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.599722][ T8739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.623643][ T8739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.648516][ T8739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.674268][ T8739] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.780076][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.807528][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.838895][ T8739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.865069][ T8739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.886664][ T8739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.913354][ T8739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.937016][ T8739] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.956607][ T8739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.973549][ T8739] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 298.084191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.113739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.554496][ T8735] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation 12:41:59 executing program 0: 12:41:59 executing program 0: 12:41:59 executing program 0: 12:41:59 executing program 0: 12:41:59 executing program 0: 12:41:59 executing program 0: [ 299.532353][ T8789] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:42:00 executing program 2: 12:42:01 executing program 1: 12:42:01 executing program 0: 12:42:01 executing program 2: 12:42:01 executing program 1: 12:42:01 executing program 0: 12:42:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:42:01 executing program 2: 12:42:01 executing program 0: [ 300.439298][ T18] Bluetooth: hci0: command 0x0409 tx timeout 12:42:01 executing program 2: 12:42:01 executing program 1: 12:42:01 executing program 1: 12:42:01 executing program 0: 12:42:01 executing program 2: [ 300.917920][ T1227] Bluetooth: hci1: command 0x0409 tx timeout 12:42:02 executing program 0: 12:42:02 executing program 1: 12:42:02 executing program 2: 12:42:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffdc0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x4a) recvfrom(r0, &(0x7f0000000100)=""/90, 0xffffffffffffff5e, 0x1010c, 0x0, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:42:02 executing program 0: 12:42:02 executing program 1: 12:42:02 executing program 2: [ 301.399352][ T1230] Bluetooth: hci2: command 0x0409 tx timeout 12:42:02 executing program 1: 12:42:02 executing program 2: 12:42:02 executing program 0: 12:42:02 executing program 0: [ 301.636665][ T59] Bluetooth: hci3: command 0x0409 tx timeout 12:42:03 executing program 3: 12:42:03 executing program 1: 12:42:03 executing program 2: 12:42:03 executing program 0: [ 302.615729][ T8760] Bluetooth: hci0: command 0x041b tx timeout 12:42:03 executing program 0: 12:42:03 executing program 1: 12:42:03 executing program 2: 12:42:03 executing program 3: 12:42:03 executing program 1: [ 303.010670][ T8760] Bluetooth: hci1: command 0x041b tx timeout 12:42:03 executing program 2: 12:42:03 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 1: 12:42:04 executing program 2: 12:42:04 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:04 executing program 3: 12:42:04 executing program 1: 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:04 executing program 3: 12:42:04 executing program 1: 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:04 executing program 3: 12:42:04 executing program 1: [ 303.487507][ T8760] Bluetooth: hci2: command 0x041b tx timeout 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:04 executing program 1: 12:42:04 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 1: 12:42:04 executing program 2: 12:42:04 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 1: 12:42:04 executing program 2: 12:42:04 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 1: [ 303.719177][ T8760] Bluetooth: hci3: command 0x041b tx timeout 12:42:04 executing program 1: 12:42:04 executing program 2: 12:42:04 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 2: 12:42:04 executing program 0: 12:42:04 executing program 1: 12:42:04 executing program 3: 12:42:04 executing program 2: 12:42:04 executing program 1: 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:04 executing program 1: 12:42:04 executing program 3: 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:04 executing program 0: 12:42:04 executing program 3: 12:42:04 executing program 1: 12:42:04 executing program 0: 12:42:04 executing program 2: 12:42:05 executing program 3: 12:42:05 executing program 1: 12:42:05 executing program 2: 12:42:05 executing program 0: 12:42:05 executing program 3: 12:42:05 executing program 0: 12:42:05 executing program 1: 12:42:05 executing program 2: 12:42:05 executing program 3: unshare(0x2a040600) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 12:42:05 executing program 0: 12:42:05 executing program 1: 12:42:05 executing program 2: 12:42:05 executing program 0: 12:42:05 executing program 2: 12:42:05 executing program 1: 12:42:05 executing program 3: unshare(0x2a040600) r0 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 12:42:05 executing program 0: 12:42:05 executing program 2: 12:42:05 executing program 0: 12:42:05 executing program 1: 12:42:05 executing program 0: 12:42:05 executing program 1: [ 304.758531][ T8760] Bluetooth: hci0: command 0x040f tx timeout 12:42:05 executing program 3: 12:42:05 executing program 2: 12:42:05 executing program 3: 12:42:05 executing program 0: 12:42:05 executing program 2: 12:42:05 executing program 1: 12:42:05 executing program 3: 12:42:05 executing program 3: 12:42:05 executing program 2: 12:42:05 executing program 1: 12:42:05 executing program 0: 12:42:05 executing program 2: 12:42:05 executing program 0: 12:42:05 executing program 3: 12:42:05 executing program 1: 12:42:05 executing program 2: 12:42:05 executing program 3: 12:42:05 executing program 1: 12:42:06 executing program 2: [ 305.157274][ T8760] Bluetooth: hci1: command 0x040f tx timeout 12:42:06 executing program 3: 12:42:06 executing program 0: 12:42:06 executing program 1: [ 305.656613][ T2859] Bluetooth: hci2: command 0x040f tx timeout 12:42:06 executing program 0: 12:42:06 executing program 2: 12:42:06 executing program 3: [ 305.803222][ T2859] Bluetooth: hci3: command 0x040f tx timeout 12:42:06 executing program 1: 12:42:06 executing program 2: 12:42:06 executing program 1: 12:42:06 executing program 3: 12:42:06 executing program 0: 12:42:06 executing program 2: 12:42:06 executing program 1: 12:42:06 executing program 3: 12:42:06 executing program 0: 12:42:06 executing program 1: 12:42:06 executing program 3: 12:42:06 executing program 0: 12:42:06 executing program 2: 12:42:06 executing program 1: 12:42:07 executing program 0: 12:42:07 executing program 3: 12:42:07 executing program 3: 12:42:07 executing program 1: 12:42:07 executing program 0: 12:42:07 executing program 2: 12:42:07 executing program 3: 12:42:07 executing program 0: 12:42:07 executing program 1: 12:42:07 executing program 2: 12:42:07 executing program 1: 12:42:07 executing program 0: 12:42:07 executing program 3: 12:42:07 executing program 1: 12:42:07 executing program 3: 12:42:07 executing program 2: 12:42:07 executing program 0: 12:42:07 executing program 1: 12:42:07 executing program 3: 12:42:07 executing program 0: 12:42:07 executing program 1: 12:42:07 executing program 2: 12:42:07 executing program 3: 12:42:07 executing program 2: 12:42:07 executing program 1: 12:42:07 executing program 3: 12:42:07 executing program 0: 12:42:07 executing program 2: 12:42:07 executing program 0: 12:42:07 executing program 3: 12:42:07 executing program 1: 12:42:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000200000000e00000004000000a8030000e0010000e00100000801000000000000e0010000d8020000d8020000d8020000d8020000d802000004000000000000000000000000000000000010000000000000000000000000000000000000e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000800000000000000000000000000000000000000000000000000000000000000000000000a80008010000000000000000000000000000000000000000000000006000484d41524b00000000000000000000000000000000000000000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000fe882200eeff00000000000000000001fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f736530000000000000000000000076657468315f746f5f626f6e64000000000000000015e8308098d9865f0000000000000000000000000000000000000000000000000000f4dfe34400a800d8000000000000000000000000000000000000000000000000003000534554000000000000000000000000000000000000000000000000000002ffff0000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000f7ff000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000001000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="500100"/93, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000400"/35], 0x150) [ 306.997195][ T2859] Bluetooth: hci0: command 0x0419 tx timeout 12:42:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x44, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}, @CTA_TIMEOUT={0x8}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x44}}, 0x0) 12:42:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) prctl$PR_GET_THP_DISABLE(0x2a) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) 12:42:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x800, 0x189600) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x6}}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000006c0)=@newlink={0x58, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4200}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_IKEY={0x8}, @IFLA_GRE_ERSPAN_HWID={0x6}, @IFLA_GRE_ENCAP_FLAGS={0x6}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x0) 12:42:08 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r1, 0x3, 0x0, 0x4000000) sendfile(r0, r0, 0x0, 0x8080fffffffe) 12:42:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000200000000e00000004000000a8030000e0010000e00100000801000000000000e0010000d8020000d8020000d8020000d8020000d802000004000000000000000000000000000000000010000000000000000000000000000000000000e9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000800000000000000000000000000000000000000000000000000000000000000000000000a80008010000000000000000000000000000000000000000000000006000484d41524b00000000000000000000000000000000000000000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000fe882200eeff00000000000000000001fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f736530000000000000000000000076657468315f746f5f626f6e64000000000000000015e8308098d9865f0000000000000000000000000000000000000000000000000000f4dfe34400a800d8000000000000000000000000000000000000000000000000003000534554000000000000000000000000000000000000000000000000000002ffff0000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000f7ff000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000001000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="500100"/93, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000400"/35], 0x150) [ 307.332538][ T9126] erofs: (device loop3): erofs_read_superblock: cannot find valid erofs superblock 12:42:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000815, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004081000418e00000004fcff", 0x58}], 0x1) 12:42:08 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, 0x0}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 307.639290][ T36] Bluetooth: hci1: command 0x0419 tx timeout [ 307.713188][ T9126] erofs: (device loop3): erofs_read_superblock: cannot find valid erofs superblock [ 307.845817][ T36] Bluetooth: hci2: command 0x0419 tx timeout [ 307.935746][ T36] Bluetooth: hci3: command 0x0419 tx timeout 12:42:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001080)=""/4112, 0x1010}], 0x1}, 0x40000104) sendmmsg$inet(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="a03693a931e6761a386f54aaba2742d962da69bc8dbefcf8d4d44522f918bda90b005680fad098046749638caf27eb6224b81f1fb750349af3a03ea45b8298dc1225241b50e98f280fd33919c27a1341c251d4b14d5d5d5a0730d02f914798bcb5b341863f4abbfcd175f87a344e26c5a76b557f12878a513ba849b3cc3cbb69aa23152e4c9c10055a732e6cea3c42e49bc1f086f5ec47928a0d4c4209962f28dd65ba430368ec183cc19b3b980d5919e7016b66afb9b45f5b5b7a15cd0b7968d7507d5f0b0c09f754a301b0b771752ca18cc99b13683e6e", 0xd8}, {&(0x7f0000000280)="77b327b36a", 0x5}], 0x2}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="934b7a949b5e2eb013809139e1d632bdc3eb1f3e1057d4f9dd25e1731ca8b78ba16b2f0547a6731866ea7342e16a086dcc4e103da1874ebec21f200b8a38db", 0x3f}, {&(0x7f00000020c0)="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", 0xef4}], 0x2}}], 0x2, 0x0) 12:42:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'vlan1\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MASTER={0x8, 0xa, r3}]}, 0x28}}, 0x0) 12:42:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000815, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010004081000418e00000004fcff", 0x58}], 0x1) 12:42:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="0411000003013fd3"], 0x1104}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000040)=""/234, 0xea) [ 308.624158][ T9171] netlink: 4336 bytes leftover after parsing attributes in process `syz-executor.0'. [ 308.725158][ T9171] netlink: 4336 bytes leftover after parsing attributes in process `syz-executor.0'. [ 308.818175][ T9173] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="0411000003013fd3"], 0x1104}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000040)=""/234, 0xea) 12:42:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) [ 308.940044][ T9180] netlink: 4336 bytes leftover after parsing attributes in process `syz-executor.0'. 12:42:09 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, 0x0}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 309.067016][ T9184] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001080)=""/4112, 0x1010}], 0x1}, 0x40000104) sendmmsg$inet(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="a03693a931e6761a386f54aaba2742d962da69bc8dbefcf8d4d44522f918bda90b005680fad098046749638caf27eb6224b81f1fb750349af3a03ea45b8298dc1225241b50e98f280fd33919c27a1341c251d4b14d5d5d5a0730d02f914798bcb5b341863f4abbfcd175f87a344e26c5a76b557f12878a513ba849b3cc3cbb69aa23152e4c9c10055a732e6cea3c42e49bc1f086f5ec47928a0d4c4209962f28dd65ba430368ec183cc19b3b980d5919e7016b66afb9b45f5b5b7a15cd0b7968d7507d5f0b0c09f754a301b0b771752ca18cc99b13683e6e", 0xd8}, {&(0x7f0000000280)="77b327b36a", 0x5}], 0x2}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="934b7a949b5e2eb013809139e1d632bdc3eb1f3e1057d4f9dd25e1731ca8b78ba16b2f0547a6731866ea7342e16a086dcc4e103da1874ebec21f200b8a38db", 0x3f}, {&(0x7f00000020c0)="b9c19e1b7ffa8e3c6faee154dcfdb4081b2b28b556e23801281c34a93269c4fd6df4eb7ef943988dc30740298caa42f5604b638f159db9260ae74e13b41f6f70c7cf804e0de13f4a2b100d4bc5f7c38dc73ac6d7618d0f23d830e7e065c58c667f50192341986b93ce37580633cd6ba44e23afc2fb78222e885517558ff7da2043037e7c055c71498c33d24b61b8a38e15097a86142d48f5cccb2c02e1f94a1929cba47e15ac3d96ba959d540f281e06c1a2e7cacd4a1a8f6fb5f86ac85492af7c1a550414081cc120f78fe8596e65b767cb7d2b863d834d9953b3f518f40e989d6c9b6db2dc29ad5473bbb5646d3fe3f26e5003a3448d5e65a790072fafd921cd22c52cd98a670cd3ed4746a28555c3de055eae21d96ebca95aea233978bea58e11186f47e1f0844432b364d110ce7f41715cd796350433c85b14994374abae5b0f0418ef71f8333cd8f2c87b8b70eccfd2dc8a45618541fae381827867848c28dba305463d83149b8b579a4be4b05295dd54a392b813cb576dd480adab4fbbed62e0c209ab9784b9f9bba68350cd75a53a7411d286fe730d3ec0353081add01f747d6cb96234d276758520fb876e0aec04e035f04bbd7be665a2d7240486b60984a77c1bf28341aa955776f11164171f8f880b10374d7feb9280a75554db3d4b77c57203275f9452585b4a65c8614c7e1f8874d70374c633ecd9d7d215aee6fa243733d3ce27942fe40dc0e1bf0b3d279e9cdaa75c050219226aa38535d1d0587a638c5f3559fff68a311de1fc64dde39f69ed682506d2f860da6bef737bfe848817d0effd207775aac51c070fc2bcecfd9753d6b290193fc610cdfa2a3b29ae6dee5b84d49ef4efdc375e802d6fa0b85090f9e77f3fac31cf3589040fe21e46805b4de72a45d7d39897612af0a1b00750f2f560c2d2a26c080c6fc6f3c09444258881f212d02a831b8a852cf30f750be64cdef9c8860d025d56ebe588edee5b062821ce5bde8cb33f6bd6a490a9d4d9b847a2f53e200c97c2ebe66ecc31a71a9e0b8e688280d9b3bddde25ff9e2f147c5fdd99f4b1c2b607e5a3d44b0e18a17239e9e21149a2e5bd041e8fff11c7089e2ee047dee5d9749284ed514736e87587da3b0e3c31e25faa90ac412ebed389bd6a5eacae382f353aa804911f095014a7e0d1bc992d35b45b3163fd82e576d6dd58bbb147d5c851f06b2f5cce13190deb12970dd3ebf6307870cb25350ed1a2e0c1c0f35f291474fda0070d63ed2feb1d1c0d8dad70383dee5330799d28f238fa258f282eb5e0e33e732dbd5d69efdbf0b68e16758f60e7a5fd088fb36e0906720afcee27753ca0d059d02ecb1803851aeeb921c7cdd21995af8a1d096db83cbafaabad9e22736f988bf1981f44b9637b97b504e8dc2da0552686f363b41d6e18eafde1467f58e1773f20d630dca0265c531b63cd41e93a1e69f56c4b3bacd8ff7598fe9de908193fda865ec85a725f5305e0af70130072da09f40e6788b8e17e188b3e7304309b77a516018ee2839b06148a9112977d44baef5e611733c1321d2f2e41f3d5806471e8be95487155191a4085f893c118c692dc694b5d81f582e7a8cd1cce341d886722b92e82420469492987c458ef287d280f7e16d3a1cb59e1bbe29fee1a9fce4b950237b14d114aba77248efa263d3b8f9043aeb98928afa575e3f93f77236d58b2dcbb2375f8efe567c34a2816c43a645641e305c513989e2a8d2115c280ef1cee3fdb1b2b4210426fd91e51fb9fbce91e9e90923a553e729afdb1320302fe211c12f63f7d086fc6a10a2f0e49179a9a2f81f017283d5e8b1a32b7ec2e221f1f7d184dfb2a116d3b81928ebc86a43c0ffd44df5965a80dd3cd35448170dc7c919860d0c1820a52d226ff136680af6c7955cb05afbdf70ffad3ae8f42e55d853a6ec3a96f2fd5337bf7113f9b96cb4d789068ada71f79e3380a9854ee7d45bb4b802da08246077d5d12b6f94eb083b8291373d7dd65dbc1c3a7d635fc782453252c909d1033c6634ab3788bbd23deeb0faf82852d2823ee9376287c54c2883da6beed01b1c28703c23c73c7d525b7abde23d801ba0518e9b1b66b12734c8bb1da7b63a5c035b030a49bb83a915df06f325d57dd041d644c45d197f7d432dece2016cbfbfa720645e500a17330a2faa8eb39abc65438837a7ab38f21943af9f7f47a4e5d081aad484d344c0a75ce47b7bea99a21aba366dc67d73f20a13ff64cb80195542412d913a588d21e20bf112193288bd494eef0234dc0084592cf62269b9a2c0be25fd4435316477bd13c2f6bef2fdb0ee51bf8d4b904f5af2893a00b27feef3108196ecce928aa0877eef01fc54f8e95393b377595e8512a0d8f4c0b6d4f14f2ca60f0d1d64e38f8cd79bcef42838da7c0e165d39278f56c613d8840c3be34daf672313e2f296ecc4d7d892b0a0ffa4a83b7556ebc8f4941fbf2be1ede87526a53ce6e6213497ab4019bb9a3b1588247579b8f91ec972b9645211c3bf44485092a15582eb37a50922e017e6e5e73b585752321abbbd8f9e0ea6400536bc7e4cf4c5d2868e23e0db73858755e5e365d54222bb33b62ca6551cd06ad54a5fe74b55cfdc3b94c30f5812c30ecef6b46a2279e79414baea33a042123ad424da61ecb51ad4eb6c447ff068eba6a0c462d9a33341fae6f6d95ce33a9f34b4ee9077dd639068934564b83a235dccfbff86cce4896a027329a1e7d2b89445b81b836205027439e099c850bc7baacebb5513844c4b0b170fbb584dd7bde2afef74e062cfcd7a624e1daa3a881032c7b00e13c5bdbea70557948c78e4d398328d4ab37b07c808b34b281638897f28faae722426f2fc03f802209e97f672c25eeeec041e5a27b1e0eda455522e8ba141c1beb86c9a2214df3fb94ebe6b554b64f151d4b7577480c26e3e83fa0df16a20fde7743c9aed45536da1f4d5070f3c41a4fc9b1ec2d89d25c57d72af4f6bfcd65efb20dcb78c2b13a098ad438c9c3fb0f0cf62742aca994cf364c50167aa71bdc988be97c72f3d527c97a4379834178a26e86948a925dd157fb93a9a033f1e1baf9e8732919899fd2e11b857c24d22c2977b19dc0e25b6fb3ccbb6c3c9deaaa75eeba340ac53f1766ebd9a4ca9e872cd3875f8d3427149504c4020cf0aeb80d86de1729050208d07adde6c052d124b33792ffc06d63e5594d4ea1e2dff63c39a2ee1429ccf9b7c800ca9ad28d96274e9b182647352990b101567032d24cd0e90521625df9a683e0f1a1434ac184164264efca1061b024628c232503b83432ddd149250796092ead6ad37331719cc1c4b0de65c9ae2d6d32c74a1399f1520cbd67cba85bf943c9196448fef2b14a27dbf96a243706f59e1adfed73eb6666cb32596d80bbbcb7cfcb307b1f464100deb76f385070b8b8c01c3e0a07780ab1ebb6d6f0a4e3e8acce011ccab5f90b6d3aaf4650f86d2886174d491f1201069865bf0b84ce53b55f6bacbb627ff5705dc187fcc394d8ff5c628dde3b33c8bb5948f12919a4e9c06846c2f46269c0309aa1f34c7fd5850f4e088204c1297a7298ade473300fce18f4040c8bd76d1f1e594a87bb5b143489f43d45c19d5fa69a484302f3fc407b0be5eb01acc6db5dbeb067cfd053379f4ac14ca8c2cc54fbdbd4b09143461c25fc5c3089ebc4eaa350f1c75ba27c70d5842694535ffc370bd9641c7cbbe310c4f96e5ced64c12392f11d87fb9c381d8e0e7451d7e3a9ae11db7b6e43e7e4f0fde93833821674d96a90cb1d0a5766a8f62304b3f6bf28bab01557a2ee95e67c2a1f8d1e06f65d4757e8fe760606a0b28111727f1a68e3e5baffbb3aa08ef85eb3e5eb374156d3f35acada8374cc01bc01006ee42ad2f7c2966027799e2078bd114bf3318a47588ead5bfcd1fb5fbfae2f8c1e499ebe981c0a04228c5cfd34e30eae88ddeb63205695af54c4c76c34cdc0b07463c7d94733a9bcf903b076759f2ef9b91b9421ab422a352165169a537984a2107aefd5bec3cc0c66bdfeade78c4ca14391c786a99ca7ccf097e83443167989e1a57dc88db7caa98d2b6a49c6a64ddf3bee952dfadec491f0b2a794d22a55fe8a2f6e33d4f405dfd1f69d2d0e9617348255537926e47fa5f1bdd323b20552ae0daacfb53b78819ec398ee537c7e3f0f51a22eca225a2c4ce72c63ccfbb01a477ccfd54119e738b9f5abedc1bf0cbbc4da8bd36357e6a6f52787241ab33f65a97406173ecabf59b1960cecd24cbd68c8c02a2495e23e03a74edee8c670e965da1c1f6f844ed0896f47b3a8fbf49396dc4a2f6669749117774ec1c2bde5921b84b5d626fa85216d3e0513d04c3a8873101c111f3a593ca3f77e80f0741b4e9e8b6c36e9df5563fd738e229e203f4d39fce8e37f524f8f0466ae6a0a6e837c8b8ab9d5a698a0241f406ae50b1834012f7d9dfe215535acd613e404e6c56dfb20320c71a0327da1790ce4f3a693d54d264bd99bdc250f32b2b637a1d6e0549dd0e8813b181fce12b044569301293fe7f1aeee9786949fdec973562f4b6ac4520255a3b5022b013e23906963d846edc0a988946a24a674acd85631f14825ef4d0b2026a26f8d0169c222636b7f090ba118adecf62c8c08255014cea054538b42d06d8cb6e94d40a2535b5a3d64df42ab08f2f81305bcdb96c977e54dca59ae85a5094b64885a5f2f90c2a1ff50bb1ca97806cc072d0aedeffc37b189dfd1f84b98d1f436f416fcffacdb711cb179312c9a81bcf68e425e02cffa4579724dde6ec958468792076e599326e30b573f41922b04589548c6ef45c3640522413fd5f4c1a3e155d77888df59df27948b5c649cf4e94da0a34b7497d69a71fb8e0a1d69ef46c6c9718af8db3f1964264fbe7c914f247a48c1c1bc75dfb0dc4ed7443fb971e3445c60044c6a88569ec079020112213e4448d2fcf9d5c0144300f8aa7143bf33a7f2ae099a8a7cba5cdf1e46bc06719d857a2b9671811fc3d0368f311e5e5f2648bcab580489c423bdbcf3d0c1ba52320fab811b977cef4a87be0a608f6ce285b2cd641fa40450bf13c31f79566a5a8f952ed7e0410624b849d60a03fa7252fc0cd335e7ba47919234ae5c2c8f5104590c18dce6550096fbaa69e332529706a6a12c7add12d76207adfe7576e1753b1377ace106a885c0d1f8b5c94cd16d16e0ea8f9fddf84c73d877d57e8bc85914ddb4f09020b53cd6d860181896aaf3286120377008bf720b64cd002bcd474766c83a362bb109fd41ed737e94d33af82bf90a20d171f5dbb64a95d7571b556f270fd175a195a1228e6c6b8585e70d31543dbff48b409e62e2a517f9a4ddf7a78f98df7427bd3c5d30a45c23bf72e48cef02c8ad99e9b931c56666e15fcf19000d3dcddf414b36de0d1a5", 0xef4}], 0x2}}], 0x2, 0x0) 12:42:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:10 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, 0x0}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 12:42:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) [ 309.910162][ T9199] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 [ 309.911573][ T9195] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000140)=[{&(0x7f00000000c0)='!', 0x1}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x10001) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r3) [ 310.042827][ T9205] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r0, &(0x7f0000000000)=[{{&(0x7f00000001c0)=@phonet={0x23, 0x0, 0x0, 0x9}, 0xc6, &(0x7f0000000100)=[{&(0x7f00000000c0)="fe4e6494af00157f7e54b77b0100", 0xe}], 0x1}}, {{&(0x7f0000000240)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "caeb4f2609243347b3e91eb7f64e64c76022a617d535b984e82b51a7a06503a789ba091bfdca7a99b510f2b3a16a6cbfbdd5d84b129bb8484e35d6f6c8a7f9"}, 0x80, 0x0, 0x0, &(0x7f00000002c0), 0x7}}], 0x2, 0x48065) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) [ 310.880782][ T9279] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) [ 310.957986][ T9286] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) [ 311.073133][ T9296] TCP: MD5 Hash failed for (0.0.0.0, 0)->(0.0.0.0, 20002) L3 index 0 12:42:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:11 executing program 3: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 3: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) dup(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) dup(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) dup(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) fcntl$dupfd(r1, 0x0, r2) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:42:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) fcntl$dupfd(r1, 0x0, r2) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) 12:42:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) fcntl$dupfd(r1, 0x0, r2) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x0, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x0, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x0, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:12 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:13 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socket$packet(0x11, 0x3, 0x300) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 12:42:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:13 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "2bfc608db527f6b191e7d1fb2fec5c0d"}]}}}}}}}, 0x0) 12:42:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 12:42:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @private}}}, 0x0, 0x0, 0x48, 0x0, "e0738940121de7c8aef3080b76a34c59c80b828fa37d885b8064000000000000bbc314e043701b6bd9b16393f65b2f28feb77db1a52a1b1d5d38a5cdcc244ba2b77c39e9c7450200"}, 0xd8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 12:42:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:14 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:14 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 3: syz_open_procfs(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000100)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001080)=""/4112, 0x1010}], 0x1}, 0x40000104) sendmmsg$inet(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="a03693a931e6761a386f54aaba2742d962da69bc8dbefcf8d4d44522f918bda90b005680fad098046749638caf27eb6224b81f1fb750349af3a03ea45b8298dc1225241b50e98f280fd33919c27a1341c251d4b14d5d5d5a0730d02f914798bcb5b341863f4abbfcd175f87a344e26c5a76b557f12878a513ba849b3cc3cbb69aa23152e4c9c10055a732e6cea3c42e49bc1f086f5ec47928a0d4c4209962f28dd65ba430368ec183cc19b3b980d5919e7016b66afb9b45f5b5b7a15cd0b7968d7507d5f0b0c09f754a301b0b771752ca18cc99b13683e6e", 0xd8}, {&(0x7f0000000280)="77b327b36a", 0x5}], 0x2}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="934b7a949b5e2eb013809139e1d632bdc3eb1f3e1057d4f9dd25e1731ca8b78ba16b2f0547a6731866ea7342e16a086dcc4e103da1874ebec21f200b8a38db", 0x3f}, {&(0x7f00000020c0)="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", 0xef4}], 0x2}}], 0x2, 0x0) 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:14 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:14 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) 12:42:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:15 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:15 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x398, 0xf8, 0x1c8, 0x0, 0x1c8, 0x0, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x8001}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x6}}}, {{@ipv6={@remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'bridge_slave_1\x00', 'batadv0\x00', {}, {}, 0x11}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@udp={{0x30, 'udp\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @random="ac7cec42630e", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, 'A\x00', 0x10, 0x3a, 0x0, @empty, @mcast2, {[], @ni}}}}}, 0x0) 12:42:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) 12:42:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) 12:42:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:15 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) setns(0xffffffffffffffff, 0x0) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) setns(0xffffffffffffffff, 0x0) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) setns(0xffffffffffffffff, 0x0) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, 0x0, 0x0) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, 0x0, 0x0) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r2) write$cgroup_pid(r1, 0x0, 0x0) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r1, 0x0) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r1, 0x0) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r1, 0x0) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 3: unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 3: unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 3: unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 3: unshare(0x0) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 3: unshare(0x0) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:17 executing program 3: unshare(0x0) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:17 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x40, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:18 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r0, 0x0) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, 0x0) setns(r0, 0x0) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, 0x0) setns(r0, 0x0) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, 0x0) setns(r0, 0x0) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(0xffffffffffffffff, 0x0) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(0xffffffffffffffff, 0x0) 12:42:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x3) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 3: unshare(0x8020000) mq_open(0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(0xffffffffffffffff, 0x0) 12:42:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 12:42:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) mq_open(&(0x7f00005a1ffb)='Nt(0\x00', 0x40, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget(0x1, 0x2000, 0x1ec4, &(0x7f0000ffc000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x19dc, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r2, 0x0) 12:42:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xa10, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002240)=""/4117, 0xffffff91}], 0x1}, 0x100) 12:42:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0) 12:42:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xa10, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) syz_genetlink_get_family_id$fou(0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002240)=""/4117, 0xffffff91}], 0x1}, 0x100) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xa10, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) syz_genetlink_get_family_id$fou(0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002240)=""/4117, 0xffffff91}], 0x1}, 0x100) 12:42:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="240000000406070800000000000000bb20200a0009000100068cb4420530439b1b080037", 0x24}], 0x1}, 0x0) 12:42:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0) 12:42:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 318.109100][T10068] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 318.123696][T10068] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mprotect(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) [ 318.223765][T10079] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 318.243552][T10079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 12:42:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000240)="d8", 0x1, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\'\x00', 0x2, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001840)) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000b00)={0x0, 0xb6, [], [@calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @generic={0x0, 0xc3, "df64de32d36a659d5981aa9f7ccc316ccbb7386de862ab3830869b72bb5aa29e14f655b11886d9da366b957a5a19a5cbc47a73b62f81c106b6901e85ff412b581ac50c63c8df447807e9673cdee8b5a1045bc8ff3f2fa21d8ac77fa912da10aa849e9c92b9aeb74bd6ad497b2599dcfe162ed6d665e1768dcd986a25ed731bb15e71c03035d008a6e8b54bf2bf1873e805d5b6bddc6b52df37c1788898911e64cea64f422cad00b5aaec416735c17372378678d8a183fec8416861b000000000000000"}, @generic={0x0, 0xd6, "959b894b6d938f0815b4a6d940a39192906c6a3dd6729b75456aa9cd7349de89c4954cc78e2cdb4f1c2a71c8ca7fa8b380c6116e25bb840adf48f044bc783a00d9a28c92d7d2efd3b145b529889789ed392fe9135f0442fdb0931c4cd4941a044281caeaa71fc81f9ed73b49e58a6f9a48f76589e8a6050e14b8f7e645f66b6f683cb53d9e078a69389b953f074d040a53697f970318ce3786a3b782969b97735335227e36505a8881801017ea1abfa3faa134efe03d679f7978ce85005be4edb3a7be533817e564a3e22d9137a372784ccc45d31297"}, @generic={0x0, 0x3ff, "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"}]}, 0x5b8) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:42:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0a00000000000000030f"]}) 12:42:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ff7000/0x3000)=nil) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 12:42:19 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="e023759d05966224b236", 0xa}], 0x1, 0x0) 12:42:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ff7000/0x3000)=nil) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf03}}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000002, 0x0) 12:42:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0a00000000000000030f"]}) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) socket$inet_udp(0x2, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ff7000/0x3000)=nil) 12:42:20 executing program 0: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:20 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001080)=""/4112, 0x1010}], 0x1}, 0x40000104) sendmmsg$inet(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="a03693a931e6761a386f54aaba2742d962da69bc8dbefcf8d4d44522f918bda90b005680fad098046749638caf27eb6224b81f1fb750349af3a03ea45b8298dc1225241b50e98f280fd33919c27a1341c251d4b14d5d5d5a0730d02f914798bcb5b341863f4abbfcd175f87a344e26c5a76b557f12878a513ba849b3cc3cbb69aa23152e4c9c10055a732e6cea3c42e49bc1f086f5ec47928a0d4c4209962f28dd65ba430368ec183cc19b3b980d5919e7016b66afb9b45f5b5b7a15cd0b7968d7507d5f0b0c09f754", 0xc9}], 0x1}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)="93", 0x1}], 0x1}}], 0x2, 0x0) 12:42:20 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:20 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:20 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:20 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:20 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:20 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000b060101000000000100fdff1d000000070001000600f2ff9b000780180001808000000000000000ff0000200000020000001c0006000442000000000c00040000000140acdc14aa140017007665746800000000616e000000008000050007008800000014001700767863616e3100000000001b020000000900120000007a32000000000c001b4072dcf77b000080000c00148008200140ee0000a5a00000000004008aab860000000000000000322a3d9cbf3d0900020073797a30"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x803715, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfef0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 12:42:20 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 319.532243][T10233] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 12:42:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 12:42:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x4c, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 12:42:21 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:21 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r3, &(0x7f00000000c0)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}, 0x0) 12:42:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) [ 320.666102][ C2] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:21 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 12:42:22 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r5, 0x3, 0x4, 0x4000000) sendfile(r1, r1, 0x0, 0x8080fffffffe) 12:42:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) [ 321.514853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:22 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:22 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 12:42:23 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r5, 0x3, 0x4, 0x4000000) sendfile(r1, r1, 0x0, 0x8080fffffffe) 12:42:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:23 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000140)) [ 322.371958][ C2] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:23 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:23 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:24 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r5, 0x3, 0x4, 0x4000000) sendfile(r1, r1, 0x0, 0x8080fffffffe) 12:42:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), 0x4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 323.207605][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:24 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r5, 0x3, 0x4, 0x4000000) sendfile(r1, r1, 0x0, 0x8080fffffffe) 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:24 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d002000098000000000000000000000000000000000000003802000038020000380200003802000038020000040000000000000000000000ac141400ac1414bb0000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000009800e000000000000000000000000000000000000000000028006473637000000000000000000000000000000000000000000000000000000000000000000000480054454500000000000000000000000000000000000000000000000000000100000000000000000000ffff0000000073797a6b616c6c6572310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000009800c000000000000000000000000000000000000000000028006c656e6774680000000000000000000000000000000000000000000000000000000001000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bridge\x00', 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xfed8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe3, 0x0) 12:42:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 324.103745][T10380] syz-executor.1 (10380) used obsolete PPPIOCDETACH ioctl 12:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000140)) 12:42:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, &(0x7f0000000140)) 12:42:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a5f74756e000000000000000000330000009500000000000000000000000000000005000000ffffff7f001800000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, &(0x7f0000000140)) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, &(0x7f0000000140)) 12:42:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) 12:42:25 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) 12:42:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:26 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f0000000500)={@void, @val={0x1}, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0xfc0, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @broadcast}, {0x0, 0x0, 0xfac, 0x0, @gue={{0x2}, "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"}}}}}, 0xfca) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x4004743c, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev}, 0x10) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000001000020000018000000000fe88000000000000000000000000000100000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000068737230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a454354000000000000"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x4004743c, 0x0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000b00)=ANY=[], 0x5b8) 12:42:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="c4000000040601010002000000feffffff6982100500010006"], 0x1}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xff99) splice(r2, 0x0, r4, 0x0, 0x1000000000007fbe, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 325.767119][T10510] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x4004743c, 0x0) 12:42:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x5, 0x9}, 0x14) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f00000000c0)='\x00', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000040)="96", 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) close(r0) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:26 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r2, 0x3, 0x0, 0x4000000) sendfile(r1, r1, 0x0, 0x8080fffffffe) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f800"/263], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:26 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r0, 0x4004743c, 0x0) 12:42:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) [ 326.253261][ T41] kauditd_printk_skb: 3 callbacks suppressed 12:42:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r0, 0x4004743c, 0x0) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 326.253569][ T41] audit: type=1400 audit(1596372147.089:31): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10554 comm="syz-executor.0" 12:42:27 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c0030000f8000000c8010000c8010000c801000000000000f0020000f0020000f0020000f0020000f00200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff0000000000000000"], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r0, 0x4004743c, 0x0) [ 326.425524][ T41] audit: type=1400 audit(1596372147.209:32): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10566 comm="syz-executor.0" 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) [ 326.554234][ T41] audit: type=1400 audit(1596372147.319:33): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10577 comm="syz-executor.0" 12:42:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) [ 326.655392][ T41] audit: type=1400 audit(1596372147.409:34): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10588 comm="syz-executor.0" 12:42:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:27 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) [ 326.840043][ T41] audit: type=1400 audit(1596372147.699:35): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10626 comm="syz-executor.0" 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:27 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0xffffff2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) 12:42:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:27 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, 0x0, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, 0x0, 0x0) 12:42:28 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474722f6375"], 0x88) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x88) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, 0x0, 0x0) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x88) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x88) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)}, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[], 0x88) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[], 0x88) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)}, 0x0) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[], 0x88) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)}, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000080)=""/253) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x88) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x0) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x88) 12:42:28 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x0) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x88) 12:42:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)}], 0x1}, 0x0) 12:42:28 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0x0000000000000001^/proc/thr\\ad-self/attr/current\x00-%[H'], 0x88) 12:42:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) [ 328.135030][ T41] audit: type=1400 audit(1596372148.989:36): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10822 comm="syz-executor.0" 12:42:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)}], 0x1}, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0x0000000000000001^/proc/thr\\ad-self/attr/current\x00-%[H'], 0x88) 12:42:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)}], 0x1}, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0x0000000000000001^/proc/thr\\ad-self/attr/current\x00-%[H'], 0x88) [ 328.206963][ T41] audit: type=1400 audit(1596372149.059:37): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10826 comm="syz-executor.0" 12:42:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)='3', 0x1}], 0x1}, 0x0) 12:42:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)='3', 0x1}], 0x1}, 0x0) [ 328.277887][ T41] audit: type=1400 audit(1596372149.129:38): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10835 comm="syz-executor.0" 12:42:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0x0000000000000001^/proc/thr\\ad-self/attr/current\x00-%[H-\x00/proc/thread-self/attr/current'], 0x88) 12:42:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='f'], 0x1) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)='3', 0x1}], 0x1}, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0x0000000000000001^/proc/thr\\ad-self/attr/current\x00-%[H-\x00/proc/thread-self/attr/current'], 0x88) [ 328.437970][ T41] audit: type=1400 audit(1596372149.299:39): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10850 comm="syz-executor.0" 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0x0000000000000001^/proc/thr\\ad-self/attr/current\x00-%[H-\x00/proc/thread-self/attr/current'], 0x88) 12:42:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) [ 328.548886][ T41] audit: type=1400 audit(1596372149.409:40): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10854 comm="syz-executor.0" 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f746872"], 0x88) 12:42:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 12:42:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f746872"], 0x88) 12:42:29 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) fallocate(r0, 0x0, 0x0, 0x4000004) open(&(0x7f00000001c0)='./bus\x00', 0x145842, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f746872"], 0x88) 12:42:29 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c66"], 0x88) 12:42:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:29 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c66"], 0x88) 12:42:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c66"], 0x88) 12:42:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f617474"], 0x88) 12:42:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x201, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 12:42:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x4004743d, &(0x7f0000000800)=""/246) 12:42:30 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c66"], 0x88) 12:42:30 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c66"], 0x88) 12:42:30 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c66"], 0x88) 12:42:30 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) r3 = dup2(r1, r0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, 0x0) 12:42:30 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) r3 = dup2(r1, r0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, 0x0) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:30 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f61"], 0x88) 12:42:30 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) r3 = dup2(r1, r0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:30 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f61"], 0x88) 12:42:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, 0x0) 12:42:30 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f61"], 0x88) 12:42:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, 0x0) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:30 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) r3 = dup2(r1, r0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f6174"], 0x88) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) r3 = dup2(r1, r0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, 0x0) 12:42:31 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f6174"], 0x88) 12:42:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, 0x0) ioctl$PPPIOCSPASS(r2, 0x4004743c, 0x0) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e2f70726f632f7468725c61642d73656c662f617474722f63757272656e74002d255b482d002f70726f632f7468726561642d73656c662f617474722f63757272656e74002329552501002f70726f632f7468726561642d73656c662f6174"], 0x88) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="02010100ac1414aa0064529be82a3489d10004000000000000ea3e010000d595"], 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 12:42:31 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r2, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) r3 = dup2(r1, r0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x4004743c, 0x0) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000b060101000000000100fdff1d000000070001000600f2ff9b000780180001808000000000000000ff0000200000020000001c0006000442000000000c00040000000140acdc14aa140017007665746800000000616e000000008000050007008800000014001700767863616e3100000000001b020000000900120000dfa232000000000c001b4072dcf77b000080000c00048008200140ee0000a5a00000000004008aab860000000000000000322a3d9cbf3d0900020073797a30"], 0x1}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$CHAR_RAW_PBSZGET(0xffffffffffffffff, 0x127b, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x803715, 0x0) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 330.571362][T11007] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 12:42:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x4004743c, 0x0) 12:42:31 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:31 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000600)=@filter={'filter\x00', 0xe, 0x4, 0x288, 0x158, 0x98, 0x98, 0x98, 0x98, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x4, 0x0, {[{{@ip={@rand_addr, @remote, 0x0, 0x0, 'bond_slave_1\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x4}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x24044080, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) 12:42:32 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:32 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000080)=""/253) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x4004743c, 0x0) 12:42:32 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:32 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0xc, 0x0, 0x80}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="6d616e676c65000000010000000079a3efc594a601d0000000000000000000001f0000000600000010040000e0020000380200008001000038020000380200007803000078030000780300007803000078030000060000000000000000feff0000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000020000000000e70079000000000000040000000000000000c000e80000000000000000000000010000000000000000002800727066696c74657200000000000000000000000000000000000000000000000100d20000000028007365740000eeff91f5a95a0000000000000000000000002bc29a080000010000000000000100280054544c00e4ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080f2ffffffffffffff0000000000000000000000000000000000000000000004000000000000000000000000000000000000edb6c16f2553f82fffffff000000000000007000980000000000000000000000000000000000000000002800445343500000001100000000000000000000000000ae5147489b0800000000000000000000abe00000027ee414aa01040000090000000000200000000000160000000000000065727305006e30000000000000000002230e00000000000082b859b60033000000000000000400000000000000000000004e0000040000007000b80000000000000000000000000000000000000000004800544545000000000008000000000006f4bc8100000400d0001f0700000001ff0200000000000000000000000000016772023000000000000000000000000000000000006e0900000000000000000000000000000000000000000000000000000000fd1a000000000000000000000000005c00000000000000000000000000f8000000000000000000000000000000000000100000000000000004000000007000a8000080000d00000000000000000000000000000000380053455400000000000000000003000000000000b70400000000000000000300000400000000000000030000dbd368fc0000000000000000009d020000000000000000000000000000000000000000000000000000000000000000f2ffffff000f00007449ffffff0000ff00dbd651320000000000000000000000000500000000000000070000f20000000000822170009800000000000000000000f3ff000000000700000000280054544c00000000f700000400000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000c00000000000000000000000000000000000000280000000004000700008000000000000600000000000000ffffffe400560000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 12:42:32 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = memfd_create(&(0x7f0000000100)='\xe55\v\xec\xd7\x8c\xa10\x8e\x8fQp\xed\x93m\xa9[\xe4J0\x98\x13\xa7\xa9\xc5\xc5\xc2\x9cu\x92[\xefv\xee\xee\x8cX\x9b\x0e/\xd2\x85\xfd\x14Q@h\xd8\v\xa9\xd5\xa7\x99\xf0\x1a!\xa9?\xfc@\xbc\xc1\x1e@\xa2\xd2\xa43\x88XW\xb4CQ\xbd\x8d\n\xb6\xe4\xcc3\xeb\x04\x00\x00\x00\x00\x00\x00\x00\xd1\'dm{\x17\xd5R!W?\xb1\xc7:\xc5\b4yjl\x11\xee\xb9X;\xc1k\x1c\xb0\xa0\x87\x9e\xc1W\xb1ER\\\xd4Q`>\xd1\xc4\x86E[0y\xab/`\xa1\x81\x9c\xb4?\x01t\xea\xdfJI\xe7)\xaf \x04e\x0e\x8a\xdf\x9e\">)\x9a\xe8R\xab\xb4%\x9c\xb6\x90\xfb\bF\xa4O\x00\xd9\n9\xa2\f\xc9\xda<\xcb2\xbf\xe5u\xe6-\x81j\xca\x8d\xf4+\x8b\xa1\x1a\x8ez\x9f\xad\xc4\'\xca\xd4z\xfbO\t\x87\xf8g\xc4\x7f\xce\x1c%\xc4\xa9(n\xd5\x87(\x172F\xf9\xa0', 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff7000/0x3000)=nil) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130009006900000000000000ab0080002100000046000107070000141900010010000008000050", 0x2b}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000002b8, 0x0) r0 = memfd_create(&(0x7f0000000040)='dummy0\x00', 0x0) r1 = geteuid() fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="0200000001000000000000000200", @ANYRES32=r1, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="040000000700000008000000", @ANYRES32, @ANYBLOB="100002fa0000000820"], 0x3c, 0x0) 12:42:33 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 12:42:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB='q'], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote, r3}, 0x14) 12:42:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6e20cf00, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) read(r3, &(0x7f00003fefff)=""/1, 0x1) tkill(r1, 0x16) clone(0x3a3dd4008214cb01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB='q'], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote, r3}, 0x14) 12:42:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:33 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 333.070726][T11107] IPVS: ftp: loaded support on port[0] = 21 12:42:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:36 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6e20cf00, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) read(r3, &(0x7f00003fefff)=""/1, 0x1) tkill(r1, 0x16) clone(0x3a3dd4008214cb01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 336.044349][T11146] IPVS: ftp: loaded support on port[0] = 21 12:42:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:36 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 336.125254][ T8] tipc: TX() has been purged, node left! 12:42:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 338.919504][ T0] NOHZ: local_softirq_pending 08 12:42:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6e20cf00, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) read(r3, &(0x7f00003fefff)=""/1, 0x1) tkill(r1, 0x16) clone(0x3a3dd4008214cb01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:39 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:39 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:40 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 339.178899][T11183] IPVS: ftp: loaded support on port[0] = 21 12:42:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:40 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) dup2(r1, r0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 339.250008][ T8] tipc: TX() has been purged, node left! 12:42:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x6e20cf00, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) read(r3, &(0x7f00003fefff)=""/1, 0x1) tkill(r1, 0x16) clone(0x3a3dd4008214cb01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:42:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) dup2(r1, r0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:43 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) dup2(r1, r0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xd10a) [ 342.402172][T11209] IPVS: ftp: loaded support on port[0] = 21 12:42:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x40000000000003f, 0x0) [ 342.506816][ T8] tipc: TX() has been purged, node left! 12:42:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, 0x0, 0x0) 12:42:44 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x38}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, 0x0, 0x0) 12:42:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, 0x0, 0x0) 12:42:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:44 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x141242, 0x0) r2 = memfd_create(&(0x7f0000000380)='iC\x00\x00\xb6p+\xc2', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)="9c", 0x1}], 0x1, 0x81809, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendfile(r1, r2, 0x0, 0x2000005) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x143042, 0x0) fallocate(r4, 0x20, 0x0, 0x8000012000) 12:42:44 executing program 1: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x3, 0x0, 0x405}}}, 0x7) 12:42:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd0, 0xd0, 0xd0, 0x0, 0x0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 'bridge_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="d7ead0b1e3fa"}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:44 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 1: syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="040e1500470c"], 0x8) 12:42:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 12:42:44 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x1c1301, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xd10a) 12:42:44 executing program 1: syz_emit_vhci(&(0x7f0000000a40)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x0, 0x0, 0x1c}, @l2cap_cid_signaling={{0x18}, [@l2cap_conn_req={{0x2, 0x5, 0x4}, {0x3}}, @l2cap_conn_req={{0x2, 0x5, 0x4}}, @l2cap_disconn_req={{0x6, 0x3, 0x4}}]}}, 0x21) 12:42:44 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x141242, 0x0) r2 = memfd_create(&(0x7f0000000380)='iC\x00\x00\xb6p+\xc2', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)="9c", 0x1}], 0x1, 0x81809, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendfile(r1, r2, 0x0, 0x2000005) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x143042, 0x0) fallocate(r4, 0x20, 0x0, 0x8000012000) 12:42:44 executing program 1: syz_emit_vhci(&(0x7f0000000700)=@HCI_EVENT_PKT={0x4, @hci_ev_auth_complete={{0x6, 0x3}}}, 0x6) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_phy_link_complete={{0x40, 0x2}}}, 0x5) 12:42:44 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000003f, 0x0) 12:42:44 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000000)={'macvlan1\x00', @ifru_mtu=0x5}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000100)={0x0, 0x87}, 0xc) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000140)={0x2, [0x0, 0x0]}) connect$bt_sco(r3, &(0x7f0000000080)={0x1f, @none}, 0x8) syz_init_net_socket$bt_l2cap(0x1f, 0x78d39ff4f2deede8, 0x0) [ 343.951960][ T1582] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN [ 343.986603][ T1582] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] [ 344.047043][ T1582] CPU: 3 PID: 1582 Comm: kworker/u18:0 Not tainted 5.8.0-rc7-syzkaller #0 [ 344.056537][ T1582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 344.127087][ T1582] Workqueue: hci1 hci_rx_work [ 344.198468][ T1582] RIP: 0010:hci_phy_link_complete_evt.isra.0+0x23e/0x790 [ 344.198468][ T1582] Code: 48 c1 ea 03 80 3c 02 00 0f 85 3e 05 00 00 48 8b 9d 30 09 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 da 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b [ 344.256637][ T1582] RSP: 0018:ffffc90004e27a38 EFLAGS: 00010202 [ 344.256637][ T1582] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff871af0e3 [ 344.256637][ T1582] RDX: 0000000000000002 RSI: ffffffff871af0f0 RDI: 0000000000000010 [ 344.256637][ T1582] RBP: ffff888065c40000 R08: 0000000000000001 R09: ffff88802590a308 [ 344.256637][ T1582] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 344.256637][ T1582] R13: ffff88801a4ad110 R14: ffff88801fb73c0b R15: 00000000000000c8 [ 344.436458][ T1582] FS: 0000000000000000(0000) GS:ffff88802d100000(0000) knlGS:0000000000000000 [ 344.456530][ T1582] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 344.456530][ T1582] CR2: 00000000016cc910 CR3: 0000000060514000 CR4: 0000000000340ee0 [ 344.506430][ T1582] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 344.526745][ T1582] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 344.526745][ T1582] Call Trace: [ 344.526745][ T1582] hci_event_packet+0x481a/0x86f5 [ 344.596710][ T1582] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 344.596710][ T1582] ? __lock_acquire+0x1621/0x56e0 [ 344.596710][ T1582] ? hci_cmd_complete_evt+0xc6e0/0xc6e0 [ 344.596710][ T1582] ? lock_acquire+0x1f1/0xad0 [ 344.596710][ T1582] ? skb_dequeue+0x1c/0x180 [ 344.596710][ T1582] ? find_held_lock+0x2d/0x110 [ 344.666430][ T1582] ? mark_lock+0xbc/0x1710 [ 344.666430][ T1582] ? mark_held_locks+0x9f/0xe0 [ 344.686441][ T1582] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 344.686441][ T1582] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 344.686441][ T1582] ? trace_hardirqs_on+0x5f/0x220 [ 344.686441][ T1582] ? lockdep_hardirqs_on+0x6a/0xe0 [ 344.736463][ T1582] hci_rx_work+0x22e/0xb10 [ 344.746493][ T1582] process_one_work+0x94c/0x1670 [ 344.766656][ T1582] ? lock_release+0x8d0/0x8d0 [ 344.766656][ T1582] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 344.766656][ T1582] ? rwlock_bug.part.0+0x90/0x90 [ 344.766656][ T1582] ? lockdep_hardirqs_off+0x66/0xa0 [ 344.806384][ T1582] worker_thread+0x64c/0x1120 [ 344.806384][ T1582] ? process_one_work+0x1670/0x1670 [ 344.806384][ T1582] kthread+0x3b5/0x4a0 [ 344.806384][ T1582] ? __kthread_bind_mask+0xc0/0xc0 [ 344.806384][ T1582] ? __kthread_bind_mask+0xc0/0xc0 [ 344.806384][ T1582] ret_from_fork+0x1f/0x30 [ 344.806384][ T1582] Modules linked in: [ 344.893080][ T1582] ---[ end trace afe602615c22f54e ]--- [ 344.917596][ T1582] RIP: 0010:hci_phy_link_complete_evt.isra.0+0x23e/0x790 [ 344.949121][ T1582] Code: 48 c1 ea 03 80 3c 02 00 0f 85 3e 05 00 00 48 8b 9d 30 09 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 da 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b [ 345.138302][ T1582] RSP: 0018:ffffc90004e27a38 EFLAGS: 00010202 [ 345.193010][ T1582] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff871af0e3 [ 345.251082][ T1582] RDX: 0000000000000002 RSI: ffffffff871af0f0 RDI: 0000000000000010 [ 345.300598][ T1582] RBP: ffff888065c40000 R08: 0000000000000001 R09: ffff88802590a308 [ 345.384533][ T1582] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 345.420492][ T1582] R13: ffff88801a4ad110 R14: ffff88801fb73c0b R15: 00000000000000c8 [ 345.449093][ T1582] FS: 0000000000000000(0000) GS:ffff88802d100000(0000) knlGS:0000000000000000 [ 345.484194][ T1582] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 345.510924][ T1582] CR2: 00007fb59f472809 CR3: 000000001a526000 CR4: 0000000000340ee0 [ 345.544072][ T1582] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 345.587944][ T1582] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 345.613537][ T1582] Kernel panic - not syncing: Fatal exception [ 345.622708][ T1582] Kernel Offset: disabled [ 345.622708][ T1582] Rebooting in 86400 seconds..