r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) 03:56:56 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:56:56 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xf0d741) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='u']) 03:56:56 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0xfffffffffffffffd, @loopback}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x8001, {{0xa, 0x4e22, 0x9, @loopback, 0x7}}}, 0x88) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:56:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:56:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400001, 0x10) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000001c0)=""/155) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r2}, &(0x7f000095c000)=0x20000148) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x264, 0x20000) connect$x25(r3, &(0x7f0000000080)={0x9, @remote={[], 0x2}}, 0x12) 03:56:56 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffd, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000004698"], 0x24) 03:56:56 executing program 4: mlockall(0x4) 03:56:56 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:56:56 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000380)={0x26c5, 0x9, 0x8, 0x46efaddb, [], [], [], 0xfffffffffffff001, 0x1, 0x7, 0x9, "dbb8c25f7b5fc5fd2c223107ac3b9b39"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000dd000018ca753fbc608a97b16ef4ce5366c375b437c7cfa7530bc553a437079d7a8f02110326de4e3dcd1e23ca034213afb1c1c3c7e8d67c52466b004e629f9bc9288da3c16d7c61779900374e09081e6e3efd83fbf649de52c8be2859a38c987e8aec11d1f129408e27b8c48e8b2f5685c10873609bae90ca9b3f634da07c1ada3bc5", @ANYRES32=0x0], &(0x7f0000000180)=0xf860) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0xe, &(0x7f0000000240)={r2, 0xfffffffffffffffe}, &(0x7f0000000200)=0x5a3f32ba6ea93103) r3 = gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x7, &(0x7f0000000040)=""/45) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x81, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r4, 0xc0c85666, &(0x7f0000000280)={{0x7, @name="db52c8616b78e959c5254d500b72f34af0e1325c9467bf0db24d887427fb2151"}, "22ea42d4a25e52d97de1cf96910601f73e321b09f34f84f41e2dd0b926657cae", 0x2}) 03:56:56 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x1000000000}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:56:56 executing program 4: mlockall(0x4) 03:56:56 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:56:57 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xf0d741) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='u']) 03:56:57 executing program 4: mlockall(0x4) 03:56:57 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) getpeername(r0, &(0x7f0000000300)=@nfc, &(0x7f0000000180)=0x80) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:56:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:56:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:57 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xae, "b9a546888f2d6ddbd52bad5e5e23c3e3370bdbc390479de261d377401a84c34a4a6d4258e054c4fa682952821940ea275f2d5e15e1e15242e8804b80f0aa676a78899a2f8e7d0727d7e5899831c8baaf051103a33ed788f86f66d720fb6dfef83473d1056c55ffd2a49a418353a08f23bb58a8d2c642f642c3297303f1eec44bc366aaf9192cc9ecea62ff2b14c9185960ac993cf323c06339e4f16962d287a835eeb1849f457d29ba54bb8fda1d"}, &(0x7f0000000200)=0xb6) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={r1, 0xcb2}, 0x8) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat\x00') openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) 03:56:57 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000100)=0x4) 03:56:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0xffffffffffffff1b) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:56:57 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES16=r0, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYBLOB="50105516be7c1711b8ba0c0f94e810bdcf746e8e8a21b623280c5975989d15d923ea89b70c6993540f62d9473eb8a7682d449706af3fa002b4f12cae508030c8bfb786a4dc859fdfdd4555548e016263d7c5171af6f227821b58bc0a819f7430ef19e43b848e54a23f52694b8a8c98b3050a", @ANYRES64=r0, @ANYPTR64, @ANYPTR64, @ANYRESOCT, @ANYRES32=r0], @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYBLOB, @ANYRES64=r0, @ANYRES64=r0], @ANYRESOCT=0x0], 0xffffff31) 03:56:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:57 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054"], 0x30}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:56:58 executing program 5: getresuid(&(0x7f00000004c0), &(0x7f00000005c0), &(0x7f0000000600)) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="85bac91f199b8b10f50e0fe8f32d58114e5ee064ba10c1a907d913580a17246a7d41b890fde23428763691cb9c83bd8e26bb57c48f6db1d3fb", 0x39, 0x42b}], 0x11, 0x0) sched_yield() openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x101000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000a004e20800000005186694cf75d1d025e032b0b068b17970000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094bb45797f2ae0064d28931487fb0b4bfd98d256aaca55c74007d36026cb86d1d3e9f597be50f946891a548dbf940c602ad7ca193a26d224216cf85c05fdf3d7b9e8da29b97c4fbd42718419170c414402a55c43cd3a1e0f46d63d325b988e5c0bdca6d729"], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) 03:56:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000011c0)={0xffffffffffffff9c, 0x10, &(0x7f0000001180)={&(0x7f0000000180)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001240)={r1, 0x10, &(0x7f0000001200)={&(0x7f0000000140)=""/19, 0x13, r2}}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001280)='/dev/snapshot\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000014c0)={0x0, 0x5}, &(0x7f0000001500)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000001540)={r4, 0x10000}, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x9, 0x30, 0x3f, 0x101}, &(0x7f0000000080)=0x18) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f00000000c0)={r5}, &(0x7f0000000000)=0x8) syz_emit_ethernet(0x1a9, &(0x7f00000012c0)={@broadcast, @local, [], {@mpls_mc={0x8848, {[{0xffffffffffffffc0, 0x1, 0x100000000}, {0x6cd, 0x7, 0x132200, 0x3}, {0x5, 0x5, 0xb7, 0x7fff}, {0xfff, 0x2, 0x4880, 0x1}, {0xa3, 0x5, 0xffffffffffffffc0, 0xfffffffffffffffe}, {0x34c7, 0x90000000, 0x4, 0x20}], @ipv6={0x7f, 0x6, "5d3a88", 0x15b, 0x2b, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, @mcast1, {[@fragment={0x1d, 0x0, 0x5, 0xffffffffffff8000, 0x0, 0x0, 0x67}, @routing={0x2f, 0x10, 0x1, 0xff, 0x0, [@empty, @ipv4={[], [], @remote}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2, @ipv4={[], [], @multicast2}, @remote, @ipv4={[], [], @broadcast}, @ipv4={[], [], @empty}]}], @udp={0x4e20, 0x4e22, 0xcb, 0x0, [@guehdr={0x1, 0x80000001, 0x3f, 0x0, 0x100}], "d554996ecbff49356dc5d7d8371318decead536307a9b17b4014193234bf3473f88e68616f19a74b528947165ee6ce4e653b00556b09a2ef5e83b1105de541c60aa7e2df23850ab9b8fb31ceb1f78f22b6fe83f4debd11c6e985ae0e197751fd17bf0077347909d3094206f5a7e271f2f2f6e3a04fc6348fc9d565a0b7a213015a64e6c43e0e9d129f8c3a92ea15daaeb57af061f786bf473de1bd81b594b26f1c35db7046e42ef70afb4ec7272c9ce70e8b6f1094af0d3022b246520b3a30"}}}}}}}, &(0x7f0000001480)={0x0, 0x1, [0xeff, 0xd18, 0xd6e, 0x45b]}) 03:56:58 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}}, 0xfffffef4) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0xf7ffffffffffffff, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000100)) 03:56:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000140)={r1}, 0x0) 03:56:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:58 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x0) 03:56:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:58 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="cc10afd88541000000000000000000000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:56:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:56:58 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x3, @loopback, 0x8}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:56:58 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054"], 0x30}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2637.401535][T25474] libceph: connect [d::]:6789 error -101 [ 2637.412588][T25474] libceph: mon0 [d::]:6789 connect error [ 2637.428980][T25474] libceph: connect [d::]:6789 error -101 [ 2637.435365][T25474] libceph: mon0 [d::]:6789 connect error 03:57:01 executing program 5: getresuid(&(0x7f00000004c0), &(0x7f00000005c0), &(0x7f0000000600)) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="85bac91f199b8b10f50e0fe8f32d58114e5ee064ba10c1a907d913580a17246a7d41b890fde23428763691cb9c83bd8e26bb57c48f6db1d3fb", 0x39, 0x42b}], 0x11, 0x0) sched_yield() openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x101000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000a004e20800000005186694cf75d1d025e032b0b068b17970000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094bb45797f2ae0064d28931487fb0b4bfd98d256aaca55c74007d36026cb86d1d3e9f597be50f946891a548dbf940c602ad7ca193a26d224216cf85c05fdf3d7b9e8da29b97c4fbd42718419170c414402a55c43cd3a1e0f46d63d325b988e5c0bdca6d729"], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) 03:57:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:57:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000140)={r1}, 0x0) 03:57:01 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000180)=""/109) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fanotify_mark(r1, 0x48, 0x20, r2, &(0x7f0000000140)='./file0\x00') sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="01180000", @ANYRES32=0x0], &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054"], 0x30}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:57:01 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="040000000000000001000100000000000000010000000000fffffff9ffffffffffffffb90000000000000000de00000000000000000000000000008300000000000000000000000000000000000000000000536c447cd743d62f8633e7cb04c9717bb6c45d9ee357b85d34af04a66f9efa0e48cda17137660589d10214c5d3296b1684b1bf7ff947a7c92acdccdc3268949c77da91bb3d6cecf1e5c86a89b3cfd395cf766e7e4c69d7603c65ae84372f6a63e82a3dfcd27eb6b32cc5536a869a0d07e79ce001249ec2c81e8134843705276053c6277f612651dfc93bcc9c073376a8ae159407994751c763b17391c404ec191e7b9971fd81a127fa5b7c95444af9242fdc44280c430000000000"]) r1 = socket$inet6(0xa, 0x802, 0x5) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r1, &(0x7f0000000280)=ANY=[], 0xffffffffffffffd5) 03:57:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="0100a8ec0000", @ANYRES32=0x0], &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b"], 0x48}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:57:01 executing program 5: getresuid(&(0x7f00000004c0), &(0x7f00000005c0), &(0x7f0000000600)) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="85bac91f199b8b10f50e0fe8f32d58114e5ee064ba10c1a907d913580a17246a7d41b890fde23428763691cb9c83bd8e26bb57c48f6db1d3fb", 0x39, 0x42b}], 0x11, 0x0) sched_yield() openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x101000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000a004e20800000005186694cf75d1d025e032b0b068b17970000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094bb45797f2ae0064d28931487fb0b4bfd98d256aaca55c74007d36026cb86d1d3e9f597be50f946891a548dbf940c602ad7ca193a26d224216cf85c05fdf3d7b9e8da29b97c4fbd42718419170c414402a55c43cd3a1e0f46d63d325b988e5c0bdca6d729"], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) 03:57:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800007) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r0}) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d57197d2c1341f0d826a60000003529ec9333a34f1888b44b3d3f059e2e8eaf5d39986c16e17e100bc07a73fdd988cc1c9ac7087d566563eead5182690aff45388f0afe491ee8601729ea91f80ee3ef43742fe78c4d3e4dd73e6c4de7a0d44ba61c0e378e26fa201560d726"], 0xfffffffffffffd7c) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x5, 0x3017, 0x0, 0xa, 0x6, 0x0, 0x2}}) 03:57:01 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x981}, 0x28, 0x3) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525800000000000000019b30000"], 0x24) 03:57:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000140)={r1}, 0x0) 03:57:02 executing program 5: getresuid(&(0x7f00000004c0), &(0x7f00000005c0), &(0x7f0000000600)) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', 0x0, 0x7, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="85bac91f199b8b10f50e0fe8f32d58114e5ee064ba10c1a907d913580a17246a7d41b890fde23428763691cb9c83bd8e26bb57c48f6db1d3fb", 0x39, 0x42b}], 0x11, 0x0) sched_yield() openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x101000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000a004e20800000005186694cf75d1d025e032b0b068b17970000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094bb45797f2ae0064d28931487fb0b4bfd98d256aaca55c74007d36026cb86d1d3e9f597be50f946891a548dbf940c602ad7ca193a26d224216cf85c05fdf3d7b9e8da29b97c4fbd42718419170c414402a55c43cd3a1e0f46d63d325b988e5c0bdca6d729"], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) tkill(r0, 0x34) wait4(0x0, 0x0, 0x0, 0x0) 03:57:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:57:02 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8880) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x107) ftruncate(r1, 0x7fffffff) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000100)) 03:57:02 executing program 5: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00') 03:57:02 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x40401) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dummy0\x00', 0xdb30}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:57:02 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b"], 0x48}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:02 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0xfffffffffffffe52) 03:57:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x3c, "873aca11b3d5750b6a5c6a9611f3cd72a81a8bd8318a480723a8fe4c23dc3b8b77a1325d2526cffcd774ec4ee7c65d7999a86f5856fa08f02e0290e4"}, &(0x7f00000000c0)=0x44) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000300)={r1, 0x7d67}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x400) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e20, 0x8, @rand_addr="628dd52f3c1e76e72c70e77895df494c", 0x3}, {0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1000}, 0x3, [0x200, 0x18000, 0x3f, 0x1ad8000000, 0x6, 0x1, 0x6, 0x2]}, 0x5c) 03:57:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000000)="0adc1f123c40a41d88b070") r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x8800, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) dup3(r1, r2, 0x0) 03:57:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:57:03 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b"], 0x48}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:03 executing program 2: 03:57:03 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRES16=r0], 0x2) 03:57:03 executing program 5: 03:57:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) 03:57:03 executing program 5: 03:57:03 executing program 3: r0 = socket$inet6(0xa, 0xa, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl(r0, 0x9e4b, &(0x7f0000000040)="d1a18463b2225bc0b00a91e7253c6895701a0b7bc1c1a45c678f2747d6e6c0") prctl$PR_SET_FP_MODE(0x2d, 0x3) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x98000, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000140)) 03:57:03 executing program 2: 03:57:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) 03:57:03 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0xffffffffffffffb2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x121000, 0x0) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000180)={0x100000001, 0xff1708, "7ff9e6641f8afeb1b7dc9efa7f5880035c8d4decbcf2bcf3", {0x7, 0x4}, 0x6}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 03:57:03 executing program 2: 03:57:03 executing program 5: 03:57:04 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000"], 0x54}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:04 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffd, @loopback, 0x3ff}, 0x1c) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001980)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8532, 0x9, &(0x7f0000001880)=[{&(0x7f0000000140)="3c1ac5e168aeec0df81f7d52f68be13af58178ca3461243b0946e8b5f8100d61cb094da8662daa7fcfa0e794b8144e91ab050ec5f61b555f930c9f60605fe3d8751a07786558c4f08de32be7d36ba1765ba0e91a07", 0x55, 0x3f}, {&(0x7f00000001c0)="b38f5c16adac758c16a1a33315b6b48cf053e28e1129820e0f53a593f544a02c8021d310649f48484690dd45febe199fe3b04a13d3496f77ec35eb36aa100ebb2b0f5768f10cb5cf1d3f7bb09fec3da088acf1e710f44c86bfbb4b584dc4e1eea5904653c1221b0853780393634e85550fa87ead832d32fdc3ac6dcf969ad460687b69ad1796e4484e81f30a447eabe9c8a88d3d54675ef026c1", 0x9a, 0x9}, {&(0x7f0000000300)="3c1e9775ab8097ea330e758e4ae12fa3d8b014a5d5904a402baae5c32ba8763595334ab9e977cff002afef2d49a1ee4e36e4a74355a2ff589e1d273dc8a7c98e8904d64dba45ba4c23f4471215246af6e18e1ef48f6a523b8395b8de40fce110b4f0f5f081c06dfc32e2ed270cf3d0f821ce192c7ef9c83a80aeadadb1df99e0d6203e46ad6ecce75e240b138cf79e2a2936f700b3374ee79b93a0ef8db89f1403d65584367a4e630e146e374b04e4935c571b73fbf8473b566fbdad9d492eadfa2fdc07e295d0e972dda619fecf73d6cbccaee9", 0xd4, 0xb25}, {&(0x7f00000004c0)="ad9de68f3eeb248c91fe4007516c29082eb8cb4fa3f0f714658082c5aa5233116a34dbe00482502d454dee3ae6fc1922d7815ed155faf1ff2b99e0453970bef0fa0a9c14ed6b40f0ffa647564f4564b387c4fbe3f3a76fb089cd6d8c74577eb58c2ac4ee7182c67d85f99abba612d4b79ec94d38a6e822b405cb5531f749ff2bd7c033fb54005d3d566033a3130ad4cbde1b063569c024e3e4a90578cba3201c0032c32a1bc192aca4470920964165c52e2a8cdc2f033cc9c42c7b6bc36b73ecda779f443e70660bfc3e747ebf88c2f85a166fa3bf6f8b2af5f02afe9e79", 0xde, 0x80}, {&(0x7f00000005c0)="880fe8de8a847362293a819088410689f1a5238f05d3ebba2b4f95a9db304e317a82b7615a3966086ac15ee7fa63875a9b79c7e976b2617ae5333d0f3441b0a6c632a5fc3265978fd49a1625c3f1f9ced7ed00984688abde08c767c7b1937716f953a49d73a988f614ffa3884a971a9e3db4ab1417ecea19c41b022da9fa898bb7fe0bc178d0f302687d34b70143d8e0b6a346e21fc20629c68cdae7e4ae5169ba9e38d9cbbf412a2fceb07048a02990a77d810b19663eb34b00734f50ef5238f3d3e658f5a615450e6b36166a6d716391054265315d5ee92f54b72f632ae949f616e721c27dd890dd", 0xe9, 0x9}, {&(0x7f00000006c0)="b8477fd42d5cff85a4090e066594412ff92627d31826ab6c53ded842099f83c2b1c28f978c373653fb0a11a2ceceee7556d903489a195fe2585579cba1dce4857f611e4b024ac61ea77ec4343c7e9902a9fe87db58aefe655e7890942ba73ca9ed028814bae002e0be82944602cad48e9fc15fdd3f60867a51de9333769ac4b33d7d68de45637466a3b1e633c735bba72f3cf5b3668316f2477ce752d19af19ef13880d06cca04056d9c5814bc83940626049280c81bdc280147eaac3ddf9f5195537e7e133b7e3124396bc45eb3e01a904ec5d85a5ecaf23a0f", 0xda, 0xdef}, {&(0x7f0000000400)="cd4c24cad1382f2587ec34eee88ba0fe0c43321587f8a1f0d54c4c9e4ec26c19180b7c04679d15b75abf960b31187b22e73831cb63c00f447025b82414a32c9f9ebc46c86d85a2035eca313066f9ccaf2dce9dfc812696edd1d20bb83982546e0c068c4bbdcff5bd091142f081bed69c0a8a0c", 0x73, 0x400}, {&(0x7f00000007c0)="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", 0x1000, 0x1}, {&(0x7f00000017c0)="be7fd7382b5153284bf4136bcb21cacd0b28fb45e7a42b269a58673a944482057130c2ffd7e9e85919ffb10ba9ff36c6326c08f9a14e9715c36a8f357d75a838066c4b2ef1ec1b6fa604870b5fd1fd351dbd7c0389df268cdb186bf6f21c079ee0a638a3a2aeb3f13e8ae84ed060c6ed14bdbe8717a3581800e37baad56469f1b19e29328cd5805589368f597e0816ac8a19d4e74ec8bc5a7367da398bccda6740cc849515fce65be07f571e05e117f3e03b8e25c7", 0xb5, 0xffff}], 0x2000000, &(0x7f0000001b40)={[{@noacl='noacl'}, {@noacl='noacl'}], [{@uid_lt={'uid<', r1}}, {@uid_gt={'uid>', r2}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) sendmsg(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001c00)="b10b938636016aa4f58f0984bb9cf936e2fabf9f5320ccd9d101b173513b323ede44240af29a588c7d43ea931a313840c1be4a3f74cee9acdfd73e294a1dc06e8fbc34da6550a57ea4e1451a04dabed09b4c0d82a100000000", 0x59}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x23) 03:57:04 executing program 2: 03:57:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) 03:57:04 executing program 5: 03:57:04 executing program 2: 03:57:04 executing program 5: 03:57:04 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0xffffffffffffffe7) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddff000000000000000000000000000000"], 0x24) 03:57:04 executing program 4: 03:57:04 executing program 1: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000080)={0xda, &(0x7f00000001c0)=""/218}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000340)=@nat={'nat\x00', 0x1b, 0x5, 0x7d0, 0x3b0, 0x0, 0x248, 0x5f0, 0x3b0, 0x700, 0x700, 0x700, 0x700, 0x700, 0x5, &(0x7f00000002c0), {[{{@uncond, 0x0, 0x200, 0x248, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x7, 0xfffffffffffffffc, 0x2000000000000000, 0x80000000, 0x30, 0x4, [@mcast2, @local, @rand_addr="f366782d37a6058056a99ea9bd58cd36", @local, @dev={0xfe, 0x80, [], 0x23}, @local, @dev={0xfe, 0x80, [], 0x1a}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @dev={0xfe, 0x80, [], 0x10}, @empty, @ipv4={[], [], @multicast1}, @mcast2], 0x4}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x10, @ipv6=@empty, @ipv4=@remote, @gre_key, @gre_key=0xef1}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x400, 0x3, 0x7467, 0x13, 0x1}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x2000000000000, 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x6, @ipv6=@mcast2, @ipv6=@mcast1, @icmp_id=0x66, @icmp_id=0x65}}}, {{@ipv6={@empty, @mcast1, [0xffffffff, 0xff000000, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffff00], 'syz_tun\x00', 'bond0\x00', {0xff}, {0xff}, 0xc, 0x8f2b, 0x2, 0x40}, 0x0, 0x118, 0x240, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x3, 0x100000000}}, @common=@eui64={0x28, 'eui64\x00'}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x3ff, 'system_u:object_r:cpu_online_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x4, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}, @ipv4=@remote, @port=0x4e22, @icmp_id=0x68}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x830) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0xe, &(0x7f0000000140)={r3}, &(0x7f000095c000)=0x20000148) 03:57:04 executing program 5: 03:57:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = getpgrp(0x0) syz_open_procfs(r0, 0x0) 03:57:05 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000"], 0x54}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:05 executing program 3: r0 = socket$inet6(0xa, 0x805, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8000, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000100)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002ac0)) fstatfs(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev, 0x0, 0x0, 'lc\x00'}, {@multicast1}}, 0x44) 03:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000080, 0x0, 0xc0010015], [0x187]}) 03:57:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff720af0fff8ffffff71a4f1ff00000000b7060000000000013d400300000000006506000001ed000071185400000000006c640000000000006a0a00fe00000000850000002e007400b7000000000000009500000000000000"], 0x0}, 0x48) 03:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000"], 0x54}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:05 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'gretap0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000000)=0x6) modify_ldt$read_default(0x2, &(0x7f0000000180)=""/152, 0x98) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xffffffff80000001, 0x440000) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0xff, 0x4a2}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:05 executing program 4: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f00000007c0)={0xa, 0x0, 0x0, @rand_addr="d6fb8cab9336c42e7676c4bbf0efc6d0", 0x2}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@loopback, @multicast1, 0x0}, &(0x7f0000000280)=0xc) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000003c0)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/relabel\x00', 0x2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/btrfs-control\x00', 0x741000, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000780)=0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'ip6_vti0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) r7 = getpid() ptrace$getregset(0x4204, r7, 0x202, &(0x7f0000000200)={&(0x7f00000001c0)=""/60, 0x3c}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000700)={&(0x7f0000000100), 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x14c, r2, 0x100, 0x70bd27, 0x25dfdbf9, {}, [{{0x8, 0x1, r3}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) 03:57:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000"], 0x5a}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:05 executing program 3: r0 = socket$inet6(0xa, 0x808, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xfffffcbe}], 0x1}, 0x14) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfe8001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 4: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f00000007c0)={0xa, 0x0, 0x0, @rand_addr="d6fb8cab9336c42e7676c4bbf0efc6d0", 0x2}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@loopback, @multicast1, 0x0}, &(0x7f0000000280)=0xc) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000003c0)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/relabel\x00', 0x2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/btrfs-control\x00', 0x741000, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000780)=0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'ip6_vti0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) r7 = getpid() ptrace$getregset(0x4204, r7, 0x202, &(0x7f0000000200)={&(0x7f00000001c0)=""/60, 0x3c}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000700)={&(0x7f0000000100), 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x14c, r2, 0x100, 0x70bd27, 0x25dfdbf9, {}, [{{0x8, 0x1, r3}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) 03:57:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) 03:57:05 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:05 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x4400, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10200}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0x160, r2, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x19}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xb10}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe0000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffe}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1d}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x5, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x54, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x6, @rand_addr="78521325ddb139cf9bc18519173bd151", 0x8}, @in6={0xa, 0x4e20, 0x0, @loopback, 0x5}, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x24}, 0x80000000}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e21, @empty}}}, 0x84) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000400)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b32900000000000000000007c192f101a2d422265848f83c15000000000000ce65ab47e0f8cdde0cb348c258e636510d87f52dbed01535b7f4f507e82d48b68150929cf0539dd4a20ba88f5f9d5db574282f4d8f13f1c73cf9789a6a8e1c93197ec99d73d08f8920d1ba983480e36ec5ef8fa167bdfaafbcd7918520ffd23f7ee6ee480caa4d5ceee0b48b3a923386cd7f73965f43eedf0a0ef3bb1f6a7dc450f524dbbcf7b3b62d85273faa400164ee04d07d62522b78b26c5c744b7b8db62e446dc2"], 0x24) 03:57:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x800, 0x501a02) recvfrom$rxrpc(r2, &(0x7f0000000080)=""/129, 0x81, 0x10020, 0x0, 0x0) 03:57:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) 03:57:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:06 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000"], 0x5a}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:06 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) ioctl$sock_ifreq(r0, 0x896e, &(0x7f0000000040)={'nr0\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x5, @local, 0xfffffffffffffff7}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="00000000f33a56994c4e46e8", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) 03:57:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:06 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:06 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4180, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000100)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYRESHEX=r0], @ANYRESDEC=r1, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYRES16=0x0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX=r0, @ANYRES32=r1], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESDEC=r1, @ANYRES32=r0, @ANYBLOB="47268e7fa0b24d617e04be942c65740cd523c6b69a79eea4f6086c87c2238891ba412dae39f4e90fb9939c160a8fb5d4e77b565e5ff44c66bbb164f52d5c452f13646cd77f205cf27a6573ed89cae67933509709a42daef2d7accd7b3b3a2cf07c648b8402e3a410b7a450d2f0a327cc4a4c824f200ece739562670d119d8a7558b76cd1059aab4c9e1aa35a4c3ed1fb7616facae894a515d3a635c2658706a6d29307612c909406a1a93a1b1fbc54a3322caf487c4f1e5e275c6fa1e8f472bcd5da44122dad7c8626f1508127f8edecd6fce062", @ANYRES64, @ANYBLOB="2d3c19e76068df74af4ec39b2dd0364c088beb7e5797d85515857a2dd896468633026c6aab8504ba661a647bab2def63423864f1d9f287fe5414a6e05c8d63e3f3c365a9c7c6374ed632120ec56a32ad37b1f584262980fb7a326a4c334de88f", @ANYPTR64], @ANYRESHEX, @ANYRESDEC=r1, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESOCT=r1]], 0x62) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0xffffffffffffff9f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r2, 0x6}, &(0x7f0000000240)=0x8) 03:57:06 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x76, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:07 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x66, 0x8000) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80202) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r2) 03:57:07 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000"], 0x5a}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:07 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:07 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:07 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) personality(0x8000000) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ccd88141a6a0d8bacfec001a00000525b85100ddffa01d5719b32900000900000000000000f6b03200000000000000"], 0x24) 03:57:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:07 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:07 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000) ioctl$KVM_SMI(r1, 0xaeb7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, 0xffffffffffffffff) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000001c0)={0xb32, 0xaa2, &(0x7f0000000140)="c11dcf6e5f32b36b88518362897ec2bba3f26472642f2dfd999b23fcaa1ce21c90c550b2a3", &(0x7f0000000180)="64d37884c482e1705a4be7422161da10ca19d6fdbfe8e294d0dd3981", 0x25, 0x1c}) accept$packet(r1, 0x0, &(0x7f0000000100)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@loopback, @dev={0xfe, 0x80, [], 0x13}, @mcast1, 0x7f, 0x8, 0x2, 0x0, 0xfffffffffffff800, 0x20, r2}) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="cc0200000000000000ec001a00000525b851000000000000000000010000000000000000"], 0x24) 03:57:07 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000"], 0x5d}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:07 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:07 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:07 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:07 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:07 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x174) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd8854186a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:08 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x6) ioctl$KDSETKEYCODE(r1, 0x4b4d, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec003a0020059f03149dddff923341fc20ebc505c074626ea7d5a01d5719b329000000000000000000e868e83317569614d303787465ab3c4aa704a5b8e66df4bc2fe88e3828d5086d0f9f54926f35fd8dfcee321b3730"], 0x24) 03:57:08 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:08 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480), 0x1, 0x0, 0xffffffffffffff04}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6c71c78d97f9d3635000525015100f6ffa01d57199339000000000000000000"], 0x24) 03:57:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:08 executing program 4: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:08 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000"], 0x5d}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:08 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 3: r0 = socket$inet6(0xa, 0x80000000000007, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x9, 0x2, [0x6, 0x2]}, &(0x7f0000000100)=0xc) fcntl$notify(r0, 0x402, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={r1, 0xaa, "723a3b5e30c57a0c1ea561c246a6d152617a3538e4c822e1bfae829250bf9d74f3589b57e762fbc459830972789b46256ccc6095f9534dc32f7742cbaf6109b05f14a475654daed3a9fccd251e0741ead35f7b55fa276470c922d3476de5423a0734d31943a9ff65f5cab63be844cb88e473ce8c184618b5442a8f823a8d58840d304e1ac4dd3ed9e6c5fa9f344d1991acd980fca7a723e9ed18d1c5f38cfeaf37c52205b97d734352d4"}, &(0x7f0000000200)=0xb2) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000280)={'icmp6\x00'}, &(0x7f0000000300)=0x1e) listen(r2, 0x8) 03:57:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:08 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:08 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:09 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000"], 0x5d}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:09 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) prctl$PR_SET_ENDIAN(0x14, 0x1) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) r1 = accept(r0, &(0x7f0000000100)=@l2, &(0x7f0000000040)=0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, r2, 0x330, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x400}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="6320e3476e2ba6a3859da124576e35aa"}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffff80}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4040}, 0x4000) 03:57:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:09 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x100000000000012f}, 0x8000) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x100, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:09 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) 03:57:09 executing program 3: r0 = socket$inet6(0xa, 0x80000000000003, 0x80000000000006) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x4c0000) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0x26, "8736a18f677f8d065e8bc9ad8fdeca0af7d799d9b33ba7e04df7fdb06d164a7ae91ba549bae7"}, &(0x7f0000000180)=0x4a) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000001c0)) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="b10b938636ea69df7b5a9984", 0xc}], 0x1}, 0x8000) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ccd88541a6a0d8bacfec001a00000525b85100ddffa01d5719b329000000000000000000"], 0x24) 03:57:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:09 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:09 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:10 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0], 0x8}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000028c0), 0x800) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'user.', 'team\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x4004) r3 = open(0x0, 0x8002, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000140)={0x42, 0x3, 0x2}, 0x10) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000280)) 03:57:10 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:10 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:10 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0"], 0x5f}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:10 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:10 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:10 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0/file0\x00', 0x40, 0x10) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000001400)={0x1, &(0x7f0000000380)=""/4096, &(0x7f00000013c0)=[{0x53, 0x3e, 0x0, &(0x7f0000001380)=""/62}]}) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000300)) futex(&(0x7f0000000140)=0x2, 0x8b, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x2, 0x1) 03:57:10 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:10 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:10 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0"], 0x5f}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:11 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:11 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0"], 0x5f}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:11 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:11 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:11 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:11 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:12 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:12 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:12 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:12 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x6}, 0x20, {0x2, 0x4e21, @broadcast}, 'ip6erspan0\x00'}) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:12 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) 03:57:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:13 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000001c0)=""/45, &(0x7f0000000200)=0x2d) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:13 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:13 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9502621dcda4ac1969bbb591f950bb64c64074fb88672fa8aafd214357bb80bd7568b1312d4d5c84ad348477c8543f355fc6df3812208eb492af9adca6acdc0621dd8e747026348da4c73e5a75c5001f1845af1aec4054b9f41"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = semget$private(0x0, 0x7, 0x10) semtimedop(r3, &(0x7f0000000000)=[{0x4, 0x1, 0x1800}, {0x3, 0x2, 0x1800}, {0x3, 0x8}], 0x3, &(0x7f00000000c0)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:14 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9502621dcda4ac1969bbb591f950bb64c64074fb88672fa8aafd214357bb80bd7568b1312d4d5c84ad348477c8543f355fc6df3812208eb492af9adca6acdc0621dd8e747026348da4c73e5a75c5001f1845af1aec4054b9f41"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = semget$private(0x0, 0x7, 0x10) semtimedop(r3, &(0x7f0000000000)=[{0x4, 0x1, 0x1800}, {0x3, 0x2, 0x1800}, {0x3, 0x8}], 0x3, &(0x7f00000000c0)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:14 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:14 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:15 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000875ed4da000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x5) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') accept4$x25(r0, 0x0, &(0x7f0000000140), 0x80000) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:15 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:16 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000875ed4da000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x5) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') accept4$x25(r0, 0x0, &(0x7f0000000140), 0x80000) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:16 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:17 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:17 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000875ed4da000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x5) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') accept4$x25(r0, 0x0, &(0x7f0000000140), 0x80000) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:17 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:17 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:17 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:17 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r0}, &(0x7f000095c000)=0x20000148) 03:57:18 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:18 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r0}, &(0x7f000095c000)=0x20000148) 03:57:18 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:18 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r0}, &(0x7f000095c000)=0x20000148) 03:57:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:18 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:18 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:18 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:18 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:19 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:19 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) 03:57:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) 03:57:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:20 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:20 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) 03:57:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:21 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x6c, r3, 0x811, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4001) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:21 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:21 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000d8d9753872d806200000000002000900400000000000bc000001000003000600000456efd600ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f0100"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:21 executing program 3: prctl$PR_GET_FP_MODE(0x2e) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x804000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000001c0)={0x7, 0x4}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000200)={0x2a, 0x4, 0x0, {0x2, 0x10001, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$key(r4, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003b010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000280)={0x0, 0x25c, 0x0}, 0x20008040) r6 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10c32020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x30, r5, 0x10, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x7, 0x7ff, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:22 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:22 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000000000bc000000000003000600000000000200ee00ffff0054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d900000000000000000000000000"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x0) clock_getres(0x3, &(0x7f0000000140)) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:22 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:22 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000000000bc000000000003000600000000000200ee00ffff0054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d900000000000000000000000000"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x0) clock_getres(0x3, &(0x7f0000000140)) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:22 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f0000000280)=0x1, 0x9, 0xfffffffff7fffffd, 0x0, 0x0, 0x2) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) fstat(r0, &(0x7f00000001c0)) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:22 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) 03:57:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:23 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xc, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) 03:57:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) 03:57:23 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(0x0, 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 2662.372707][ T2787] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 2662.436020][ T2787] CPU: 0 PID: 2787 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #39 [ 2662.443942][ T2787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2662.453999][ T2787] Call Trace: [ 2662.457300][ T2787] dump_stack+0x172/0x1f0 [ 2662.462491][ T2787] dump_header+0x10f/0xb6c [ 2662.466920][ T2787] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2662.472738][ T2787] ? ___ratelimit+0x60/0x595 [ 2662.477339][ T2787] ? do_raw_spin_unlock+0x57/0x270 [ 2662.482477][ T2787] oom_kill_process.cold+0x10/0x15 [ 2662.487595][ T2787] out_of_memory+0x79a/0x1280 [ 2662.492283][ T2787] ? lock_downgrade+0x880/0x880 [ 2662.497143][ T2787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2662.503453][ T2787] ? oom_killer_disable+0x280/0x280 [ 2662.508658][ T2787] ? find_held_lock+0x35/0x130 [ 2662.513450][ T2787] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2662.519006][ T2787] ? memcg_event_wake+0x230/0x230 [ 2662.524048][ T2787] ? do_raw_spin_unlock+0x57/0x270 [ 2662.529170][ T2787] ? _raw_spin_unlock+0x2d/0x50 [ 2662.534034][ T2787] try_charge+0x102c/0x15c0 [ 2662.538548][ T2787] ? find_held_lock+0x35/0x130 [ 2662.543398][ T2787] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2662.548948][ T2787] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2662.554579][ T2787] ? find_held_lock+0x35/0x130 [ 2662.559327][ T2787] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 2662.564870][ T2787] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2662.570412][ T2787] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2662.575603][ T2787] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2662.581147][ T2787] __memcg_kmem_charge+0x136/0x300 [ 2662.586304][ T2787] __alloc_pages_nodemask+0x437/0x7e0 [ 2662.591671][ T2787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2662.597902][ T2787] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2662.603621][ T2787] ? copy_process.part.0+0x1d08/0x7980 [ 2662.609077][ T2787] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2662.614451][ T2787] ? trace_hardirqs_on+0x67/0x230 [ 2662.619460][ T2787] ? kasan_check_read+0x11/0x20 [ 2662.624322][ T2787] copy_process.part.0+0x3e0/0x7980 [ 2662.629540][ T2787] ? psi_memstall_leave+0x11c/0x180 [ 2662.634773][ T2787] ? sched_clock+0x2e/0x50 [ 2662.639171][ T2787] ? psi_memstall_leave+0x12e/0x180 [ 2662.644372][ T2787] ? find_held_lock+0x35/0x130 [ 2662.649146][ T2787] ? psi_memstall_leave+0x12e/0x180 [ 2662.654380][ T2787] ? __cleanup_sighand+0x60/0x60 [ 2662.659327][ T2787] ? __lock_acquire+0x548/0x3fb0 [ 2662.664291][ T2787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2662.670544][ T2787] _do_fork+0x257/0xfd0 [ 2662.674713][ T2787] ? fork_idle+0x1d0/0x1d0 [ 2662.679151][ T2787] ? blkcg_maybe_throttle_current+0x5e2/0xfc0 [ 2662.685201][ T2787] ? lock_downgrade+0x880/0x880 [ 2662.690043][ T2787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2662.696308][ T2787] ? blkcg_exit_queue+0x30/0x30 [ 2662.701154][ T2787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2662.706607][ T2787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2662.712074][ T2787] ? do_syscall_64+0x26/0x610 [ 2662.716738][ T2787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2662.722796][ T2787] ? do_syscall_64+0x26/0x610 [ 2662.727463][ T2787] __x64_sys_clone+0xbf/0x150 [ 2662.732130][ T2787] do_syscall_64+0x103/0x610 [ 2662.736735][ T2787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2662.742610][ T2787] RIP: 0033:0x45abd9 [ 2662.746497][ T2787] Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2662.766105][ T2787] RSP: 002b:00007ffe7360ecf8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2662.774519][ T2787] RAX: ffffffffffffffda RBX: 00007f3ff58cd700 RCX: 000000000045abd9 [ 2662.782497][ T2787] RDX: 00007f3ff58cd9d0 RSI: 00007f3ff58ccdb0 RDI: 00000000003d0f00 [ 2662.790473][ T2787] RBP: 00007ffe7360ef00 R08: 00007f3ff58cd700 R09: 00007f3ff58cd700 [ 2662.798440][ T2787] R10: 00007f3ff58cd9d0 R11: 0000000000000202 R12: 0000000000000000 [ 2662.806417][ T2787] R13: 00007ffe7360edaf R14: 00007f3ff58cd9c0 R15: 000000000073bf0c [ 2662.819002][ T2787] memory: usage 307132kB, limit 307200kB, failcnt 8064 [ 2662.826111][ T2787] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2662.833776][ T2787] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2662.840875][ T2787] Memory cgroup stats for /syz5: cache:16KB rss:208736KB rss_huge:165888KB shmem:72KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:208812KB inactive_file:4KB active_file:0KB unevictable:0KB [ 2662.863053][ T2787] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=20406,uid=0 03:57:24 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x2, {0xa, 0x4e21, 0xffffffffffffff01, @remote, 0x7}, r5}}, 0x38) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2662.878826][ T2787] Memory cgroup out of memory: Killed process 20406 (syz-executor.5) total-vm:72448kB, anon-rss:2196kB, file-rss:35844kB, shmem-rss:0kB 03:57:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) 03:57:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(0x0, 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:24 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000140)=0xd, 0x4) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(0x0, 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) 03:57:24 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth0_to_bridge\x00'}}, 0x1e) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:24 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) unshare(0x28000000) r4 = mq_open(&(0x7f0000000480)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000018c0)={0x0, 0xc2, "c3c9faddc721cda10c62802facefebda87ffe4619e21b9beaae92b0a2885fa144a36f4046e14b27f05dc432aa257bb99e655be9b9599c0bfd476c2619d11f690e7e89a8330919c882f9c1e29281d94e20657a6f24577830d5f12c0bddecaf526b967c1a054098432d39764195bf09a5ee0c75b61990f5459e3abe4924d1ae858f203838b30e3ae058158396c5a1ab4aa53b966699439f7b013dd2b17b41b87125f40ec4cff1d9ca8fa50857ab69f4795ed5c5c768777de2eea436096445830d53a66"}, &(0x7f00000019c0)=0xca) sendmsg$inet_sctp(r1, &(0x7f0000001a80)={&(0x7f00000001c0)=@in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c, &(0x7f0000001840)=[{&(0x7f0000000540)="cad094e3d308d8209bc83a8a8fe6187ccb09a819f1b3ab756b71e9841cb62fb0245d1021c4ef042ad587f0b40b33fd3fe06cabd785b2a13f240d1364ab5e52b8fb921f4207bb5ee6454411e07481a04710795ada438cbf316b899b4a0e2d44189cafb4adc6de1c9bd13cbbe2441e08e0e1ac3f6e9c7728b92310e3257443ce82e5c09a7883b70da84b9c07658db40c04d3a80c2cafc6e539b396619192f9d749a46669502cc4f39f54a98ce7b8884e6b5d8dc82a28f51ab833f29357c48d0463983c93dfd3338fe91df01e42e7cd750edf2284ee1ce3c34b46a586f1deedfc72", 0xe0}, {&(0x7f0000000640)="1023d7c20efba6bb664493262571fde0eafb73e1236954e436060d0723ab14d5b31861b7c8b6b70f11416deae93b7180b796d0ef5c1a04f6729c640cf76832256204162a8ecbf1", 0x47}, {&(0x7f0000000200)="02093d68ad13d89d4ddfaa56ca0685ca24d085f4a000b4a8", 0x18}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000300)="1e68bf2856ef30fa369f73f5ddffe8de60", 0x11}, {&(0x7f00000016c0)="7f2d82b0c7c9b9871edb95a713a0740dcbf84e0cbbe2aa3bdd2a65d332c2454707d1753ab2bf04401b5a35abb564ca82eb8b7c6bb92e9ad6f4aeb04e02647694725f918c0c1eaf0f88ea567944a1a9cca206f2d700853d79b1cbf97c45eedbbeb0237523d67b99ff5384ddebe805e7d5d795bfd464655624e7c9ba3cfa", 0x7d}, {&(0x7f0000001740)="e4e96141518456a1c39993839eef915745530e08dfd1106a1aee837ef0356c60267a7e24b7e7f06f5d63ae54698fe78aa977cb3c796b97209e2d2291285d694f58bd860dc73cc7462951d26377ee2e86fa194dca43882970fa34c4b01dc918ef0217644826b4e3d1b465ab2aefa674f6e51826b526823dced090fe2c8ff9ba9207308211e55a48c85e252007fb6a60f63b278f025651ec4db802dc6a307cab670840672628ec5c8a4a0112745ccc6ca8dd53946bdf80aca64396dce7c5515fb0179bb7bde880a977f54f891b4d18c52bae24739d1347a2d9212d68a123c9697b9e", 0xe1}], 0x7, &(0x7f0000001a00)=ANY=[@ANYBLOB="30000000000000008400000001000000fdff0800028000000300000005000000070000daca59516a755cec96", @ANYRES32=r5], 0x30, 0x20008050}, 0x10) mq_getsetattr(r4, &(0x7f0000738fc0)={0x800}, &(0x7f0000356000)) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c01000000000040f5773716a9fc5200400000000000bc002908a682d171d53d4d2700bd0000000003000600000000000200ee00e0000002d81458186fe8b9001f0001000000020200040d87fbf2c59477354e374a7b030005000000"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) write$ppp(r0, &(0x7f0000000380)="ed228da86075338b743e72bb4c9df3a79b7fe9df0c3b89b514e40b754b213c4752422177babe695930097912d466a869036b6b2ec3b153375aa6b023b2fde684f9692d3711d525deec671bb9ea2476e25686c4d393e6520db889b5c87b88f0a62cf57f9415199d87b5c09409d0492a64b70252e841a5fb88be2dc61b830a2662e090a46c8306b16aa1f2ac3ecfba7898b73b57caf254a2ed7687fb9ec0d9dacc75e8a16f9a16370921ca0bbcc6456fbbc5bbede1ddc7d91ac866e1dd201700ad4c855479a0ee8786d851ea75949ab900f890e115e502fda3d456bd8ba4a2fcdd930b3e06324b5167ea8535a35533f01bd86d3d", 0xf3) syz_genetlink_get_family_id$team(&(0x7f0000001b00)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x80000) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000001ac0)=""/15) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000140)={0x0, r3}) rmdir(&(0x7f0000000000)='./file0\x00') mlockall(0x1) 03:57:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2663.613093][ T25] audit: type=1804 audit(2000001444.959:283): pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir271241296/syzkaller.aJC36X/3350/file0" dev="sda1" ino=19542 res=1 [ 2663.803188][ T2848] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2663.813218][ T2848] CPU: 0 PID: 2848 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #39 [ 2663.821103][ T2848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2663.831167][ T2848] Call Trace: [ 2663.834476][ T2848] dump_stack+0x172/0x1f0 [ 2663.838830][ T2848] dump_header+0x10f/0xb6c [ 2663.843249][ T2848] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2663.849077][ T2848] ? ___ratelimit+0x60/0x595 [ 2663.853672][ T2848] ? do_raw_spin_unlock+0x57/0x270 [ 2663.858798][ T2848] oom_kill_process.cold+0x10/0x15 [ 2663.863923][ T2848] out_of_memory+0x79a/0x1280 [ 2663.868616][ T2848] ? lock_downgrade+0x880/0x880 [ 2663.873473][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2663.879727][ T2848] ? oom_killer_disable+0x280/0x280 [ 2663.884938][ T2848] ? find_held_lock+0x35/0x130 [ 2663.889736][ T2848] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2663.895284][ T2848] ? memcg_event_wake+0x230/0x230 [ 2663.900306][ T2848] ? do_raw_spin_unlock+0x57/0x270 [ 2663.905405][ T2848] ? _raw_spin_unlock+0x2d/0x50 [ 2663.910261][ T2848] try_charge+0x102c/0x15c0 [ 2663.914760][ T2848] ? find_held_lock+0x35/0x130 [ 2663.919542][ T2848] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2663.925311][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2663.931548][ T2848] ? kasan_check_read+0x11/0x20 [ 2663.936410][ T2848] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2663.941965][ T2848] mem_cgroup_try_charge+0x24d/0x5e0 [ 2663.947268][ T2848] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2663.952905][ T2848] __handle_mm_fault+0x1e1f/0x3ec0 [ 2663.958018][ T2848] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2663.963573][ T2848] ? find_held_lock+0x35/0x130 [ 2663.968383][ T2848] ? handle_mm_fault+0x322/0xb30 [ 2663.973346][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2663.979617][ T2848] ? kasan_check_read+0x11/0x20 [ 2663.984481][ T2848] handle_mm_fault+0x43f/0xb30 [ 2663.989266][ T2848] __get_user_pages+0x7b6/0x1a40 [ 2663.994225][ T2848] ? follow_page_mask+0x19a0/0x19a0 [ 2663.999436][ T2848] ? __vma_adjust+0x1840/0x1840 [ 2664.004287][ T2848] ? lock_acquire+0x16f/0x3f0 [ 2664.008973][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.015229][ T2848] populate_vma_page_range+0x20d/0x2a0 [ 2664.020697][ T2848] __mm_populate+0x204/0x380 [ 2664.025286][ T2848] ? populate_vma_page_range+0x2a0/0x2a0 [ 2664.030928][ T2848] __x64_sys_mlockall+0x35c/0x520 [ 2664.035948][ T2848] do_syscall_64+0x103/0x610 [ 2664.040541][ T2848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2664.046436][ T2848] RIP: 0033:0x458209 [ 2664.050344][ T2848] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2664.069999][ T2848] RSP: 002b:00007f72f1bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 2664.078420][ T2848] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458209 [ 2664.086431][ T2848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 2664.094414][ T2848] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.102398][ T2848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f72f1bcc6d4 [ 2664.110394][ T2848] R13: 00000000004c3eda R14: 00000000004d70c0 R15: 00000000ffffffff [ 2664.118693][ T2848] memory: usage 307200kB, limit 307200kB, failcnt 257 [ 2664.125521][ T2848] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2664.132976][ T2848] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:57:25 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(0x0, 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, 0x0, 0x0) [ 2664.139992][ T2848] Memory cgroup stats for /syz3: cache:108KB rss:214632KB rss_huge:147456KB shmem:120KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:201648KB inactive_file:4KB active_file:8KB unevictable:13064KB [ 2664.162442][ T2848] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=24367,uid=0 03:57:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) [ 2664.193329][ T2848] Memory cgroup out of memory: Killed process 24367 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35792kB, shmem-rss:0kB 03:57:25 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x800) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth0_to_bridge\x00'}}, 0x1e) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r4 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:25 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) unshare(0x28000000) r4 = mq_open(&(0x7f0000000480)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000018c0)={0x0, 0xc2, "c3c9faddc721cda10c62802facefebda87ffe4619e21b9beaae92b0a2885fa144a36f4046e14b27f05dc432aa257bb99e655be9b9599c0bfd476c2619d11f690e7e89a8330919c882f9c1e29281d94e20657a6f24577830d5f12c0bddecaf526b967c1a054098432d39764195bf09a5ee0c75b61990f5459e3abe4924d1ae858f203838b30e3ae058158396c5a1ab4aa53b966699439f7b013dd2b17b41b87125f40ec4cff1d9ca8fa50857ab69f4795ed5c5c768777de2eea436096445830d53a66"}, &(0x7f00000019c0)=0xca) sendmsg$inet_sctp(r1, &(0x7f0000001a80)={&(0x7f00000001c0)=@in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c, &(0x7f0000001840)=[{&(0x7f0000000540)="cad094e3d308d8209bc83a8a8fe6187ccb09a819f1b3ab756b71e9841cb62fb0245d1021c4ef042ad587f0b40b33fd3fe06cabd785b2a13f240d1364ab5e52b8fb921f4207bb5ee6454411e07481a04710795ada438cbf316b899b4a0e2d44189cafb4adc6de1c9bd13cbbe2441e08e0e1ac3f6e9c7728b92310e3257443ce82e5c09a7883b70da84b9c07658db40c04d3a80c2cafc6e539b396619192f9d749a46669502cc4f39f54a98ce7b8884e6b5d8dc82a28f51ab833f29357c48d0463983c93dfd3338fe91df01e42e7cd750edf2284ee1ce3c34b46a586f1deedfc72", 0xe0}, {&(0x7f0000000640)="1023d7c20efba6bb664493262571fde0eafb73e1236954e436060d0723ab14d5b31861b7c8b6b70f11416deae93b7180b796d0ef5c1a04f6729c640cf76832256204162a8ecbf1", 0x47}, {&(0x7f0000000200)="02093d68ad13d89d4ddfaa56ca0685ca24d085f4a000b4a8", 0x18}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000300)="1e68bf2856ef30fa369f73f5ddffe8de60", 0x11}, {&(0x7f00000016c0)="7f2d82b0c7c9b9871edb95a713a0740dcbf84e0cbbe2aa3bdd2a65d332c2454707d1753ab2bf04401b5a35abb564ca82eb8b7c6bb92e9ad6f4aeb04e02647694725f918c0c1eaf0f88ea567944a1a9cca206f2d700853d79b1cbf97c45eedbbeb0237523d67b99ff5384ddebe805e7d5d795bfd464655624e7c9ba3cfa", 0x7d}, {&(0x7f0000001740)="e4e96141518456a1c39993839eef915745530e08dfd1106a1aee837ef0356c60267a7e24b7e7f06f5d63ae54698fe78aa977cb3c796b97209e2d2291285d694f58bd860dc73cc7462951d26377ee2e86fa194dca43882970fa34c4b01dc918ef0217644826b4e3d1b465ab2aefa674f6e51826b526823dced090fe2c8ff9ba9207308211e55a48c85e252007fb6a60f63b278f025651ec4db802dc6a307cab670840672628ec5c8a4a0112745ccc6ca8dd53946bdf80aca64396dce7c5515fb0179bb7bde880a977f54f891b4d18c52bae24739d1347a2d9212d68a123c9697b9e", 0xe1}], 0x7, &(0x7f0000001a00)=ANY=[@ANYBLOB="30000000000000008400000001000000fdff0800028000000300000005000000070000daca59516a755cec96", @ANYRES32=r5], 0x30, 0x20008050}, 0x10) mq_getsetattr(r4, &(0x7f0000738fc0)={0x800}, &(0x7f0000356000)) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c01000000000040f5773716a9fc5200400000000000bc002908a682d171d53d4d2700bd0000000003000600000000000200ee00e0000002d81458186fe8b9001f0001000000020200040d87fbf2c59477354e374a7b030005000000"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) write$ppp(r0, &(0x7f0000000380)="ed228da86075338b743e72bb4c9df3a79b7fe9df0c3b89b514e40b754b213c4752422177babe695930097912d466a869036b6b2ec3b153375aa6b023b2fde684f9692d3711d525deec671bb9ea2476e25686c4d393e6520db889b5c87b88f0a62cf57f9415199d87b5c09409d0492a64b70252e841a5fb88be2dc61b830a2662e090a46c8306b16aa1f2ac3ecfba7898b73b57caf254a2ed7687fb9ec0d9dacc75e8a16f9a16370921ca0bbcc6456fbbc5bbede1ddc7d91ac866e1dd201700ad4c855479a0ee8786d851ea75949ab900f890e115e502fda3d456bd8ba4a2fcdd930b3e06324b5167ea8535a35533f01bd86d3d", 0xf3) syz_genetlink_get_family_id$team(&(0x7f0000001b00)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x80000) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000001ac0)=""/15) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000140)={0x0, r3}) rmdir(&(0x7f0000000000)='./file0\x00') mlockall(0x1) [ 2664.333640][ T1043] oom_reaper: reaped process 24367 (syz-executor.3), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB 03:57:25 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2664.433415][ T2848] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2664.469900][ T2848] CPU: 0 PID: 2848 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #39 [ 2664.477834][ T2848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2664.487912][ T2848] Call Trace: [ 2664.491239][ T2848] dump_stack+0x172/0x1f0 [ 2664.495580][ T2848] dump_header+0x10f/0xb6c [ 2664.499998][ T2848] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2664.505808][ T2848] ? ___ratelimit+0x60/0x595 [ 2664.510407][ T2848] ? do_raw_spin_unlock+0x57/0x270 [ 2664.515519][ T2848] oom_kill_process.cold+0x10/0x15 [ 2664.520633][ T2848] out_of_memory+0x79a/0x1280 [ 2664.525310][ T2848] ? lock_downgrade+0x880/0x880 [ 2664.530160][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.536409][ T2848] ? oom_killer_disable+0x280/0x280 [ 2664.541601][ T2848] ? find_held_lock+0x35/0x130 [ 2664.546381][ T2848] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2664.551957][ T2848] ? memcg_event_wake+0x230/0x230 [ 2664.557009][ T2848] ? do_raw_spin_unlock+0x57/0x270 [ 2664.562116][ T2848] ? _raw_spin_unlock+0x2d/0x50 [ 2664.566968][ T2848] try_charge+0x102c/0x15c0 [ 2664.571467][ T2848] ? find_held_lock+0x35/0x130 [ 2664.576234][ T2848] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2664.581782][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.588028][ T2848] ? kasan_check_read+0x11/0x20 [ 2664.592878][ T2848] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2664.598467][ T2848] mem_cgroup_try_charge+0x24d/0x5e0 [ 2664.603756][ T2848] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2664.609426][ T2848] __handle_mm_fault+0x1e1f/0x3ec0 [ 2664.614556][ T2848] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2664.620102][ T2848] ? find_held_lock+0x35/0x130 [ 2664.624862][ T2848] ? handle_mm_fault+0x322/0xb30 [ 2664.629809][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.636051][ T2848] ? kasan_check_read+0x11/0x20 [ 2664.640905][ T2848] handle_mm_fault+0x43f/0xb30 [ 2664.645673][ T2848] __get_user_pages+0x7b6/0x1a40 [ 2664.650619][ T2848] ? follow_page_mask+0x19a0/0x19a0 [ 2664.656339][ T2848] ? __vma_adjust+0x1840/0x1840 [ 2664.661211][ T2848] ? lock_acquire+0x16f/0x3f0 [ 2664.665890][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2664.672131][ T2848] populate_vma_page_range+0x20d/0x2a0 [ 2664.677594][ T2848] __mm_populate+0x204/0x380 [ 2664.682185][ T2848] ? populate_vma_page_range+0x2a0/0x2a0 [ 2664.687828][ T2848] __x64_sys_mlockall+0x35c/0x520 [ 2664.692854][ T2848] do_syscall_64+0x103/0x610 [ 2664.697463][ T2848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2664.703354][ T2848] RIP: 0033:0x458209 [ 2664.707261][ T2848] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2664.726868][ T2848] RSP: 002b:00007f72f1bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 2664.735284][ T2848] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458209 [ 2664.743256][ T2848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 2664.751313][ T2848] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.759284][ T2848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f72f1bcc6d4 [ 2664.767251][ T2848] R13: 00000000004c3eda R14: 00000000004d70c0 R15: 00000000ffffffff [ 2664.791651][ T2848] memory: usage 307164kB, limit 307200kB, failcnt 277 [ 2664.801066][ T2848] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:57:26 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(0x0, 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2664.832550][ T2848] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2664.891582][ T2848] Memory cgroup stats for /syz3: cache:0KB rss:214796KB rss_huge:145408KB shmem:120KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:199480KB inactive_file:4KB active_file:4KB unevictable:15412KB [ 2664.942719][ T2848] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=26045,uid=0 [ 2664.965210][ T2848] Memory cgroup out of memory: Killed process 26045 (syz-executor.3) total-vm:72448kB, anon-rss:2192kB, file-rss:34816kB, shmem-rss:0kB [ 2665.041182][ T25] audit: type=1804 audit(2000001446.389:284): pid=2881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir271241296/syzkaller.aJC36X/3351/file0" dev="sda1" ino=19451 res=1 [ 2665.100613][ T2876] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2665.121003][ T2876] CPU: 0 PID: 2876 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #39 [ 2665.128911][ T2876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2665.138968][ T2876] Call Trace: [ 2665.142269][ T2876] dump_stack+0x172/0x1f0 [ 2665.146611][ T2876] dump_header+0x10f/0xb6c [ 2665.151610][ T2876] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2665.157422][ T2876] ? ___ratelimit+0x60/0x595 [ 2665.162019][ T2876] ? do_raw_spin_unlock+0x57/0x270 [ 2665.167144][ T2876] oom_kill_process.cold+0x10/0x15 [ 2665.172261][ T2876] out_of_memory+0x79a/0x1280 [ 2665.176952][ T2876] ? oom_killer_disable+0x280/0x280 [ 2665.182154][ T2876] ? find_held_lock+0x35/0x130 [ 2665.186936][ T2876] mem_cgroup_out_of_memory+0x1ca/0x230 [ 2665.192486][ T2876] ? memcg_event_wake+0x230/0x230 [ 2665.197990][ T2876] ? do_raw_spin_unlock+0x57/0x270 [ 2665.203109][ T2876] ? _raw_spin_unlock+0x2d/0x50 [ 2665.207971][ T2876] try_charge+0x102c/0x15c0 [ 2665.212476][ T2876] ? find_held_lock+0x35/0x130 [ 2665.217255][ T2876] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2665.222809][ T2876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.229062][ T2876] ? kasan_check_read+0x11/0x20 [ 2665.233923][ T2876] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 2665.239479][ T2876] mem_cgroup_try_charge+0x24d/0x5e0 [ 2665.244775][ T2876] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2665.250592][ T2876] __handle_mm_fault+0x1e1f/0x3ec0 [ 2665.255715][ T2876] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2665.261267][ T2876] ? find_held_lock+0x35/0x130 [ 2665.266038][ T2876] ? handle_mm_fault+0x322/0xb30 [ 2665.270993][ T2876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.277242][ T2876] ? kasan_check_read+0x11/0x20 [ 2665.282107][ T2876] handle_mm_fault+0x43f/0xb30 [ 2665.286885][ T2876] __get_user_pages+0x7b6/0x1a40 [ 2665.291842][ T2876] ? follow_page_mask+0x19a0/0x19a0 [ 2665.297045][ T2876] ? __vma_adjust+0x1840/0x1840 [ 2665.301912][ T2876] ? lock_acquire+0x16f/0x3f0 [ 2665.306598][ T2876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.312849][ T2876] populate_vma_page_range+0x20d/0x2a0 [ 2665.318320][ T2876] __mm_populate+0x204/0x380 [ 2665.322927][ T2876] ? populate_vma_page_range+0x2a0/0x2a0 [ 2665.328576][ T2876] __x64_sys_mlockall+0x35c/0x520 [ 2665.333611][ T2876] do_syscall_64+0x103/0x610 [ 2665.338215][ T2876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2665.344108][ T2876] RIP: 0033:0x458209 [ 2665.348006][ T2876] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2665.367614][ T2876] RSP: 002b:00007f3ff58abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 2665.376029][ T2876] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458209 [ 2665.383997][ T2876] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 2665.391969][ T2876] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 03:57:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:26 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) getpgid(r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000200)) lsetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'TIPC\x00'}, &(0x7f0000000400)='net/ptype\x00', 0xa, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x70, r5, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9b900000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xc9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x101}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000001c0)={0x0, 0x5, 0xfff, [], &(0x7f0000000140)=0x1d}) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0) accept4$packet(r2, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000002b00)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0xf0ba550103ab9650}, 0x4004) r6 = open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x80000, 0x11) ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) [ 2665.399940][ T2876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ff58ac6d4 [ 2665.408196][ T2876] R13: 00000000004c3eda R14: 00000000004d70c0 R15: 00000000ffffffff 03:57:26 executing program 2 (fault-call:5 fault-nth:0): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) [ 2665.548753][ T2907] FAULT_INJECTION: forcing a failure. [ 2665.548753][ T2907] name failslab, interval 1, probability 0, space 0, times 0 [ 2665.551024][ T2876] memory: usage 307140kB, limit 307200kB, failcnt 8092 [ 2665.603101][ T2907] CPU: 1 PID: 2907 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #39 [ 2665.611034][ T2907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2665.611120][ T2876] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2665.621115][ T2907] Call Trace: [ 2665.621188][ T2907] dump_stack+0x172/0x1f0 [ 2665.621215][ T2907] should_fail.cold+0xa/0x15 [ 2665.621237][ T2907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2665.621261][ T2907] ? ___might_sleep+0x163/0x280 [ 2665.621284][ T2907] __should_failslab+0x121/0x190 [ 2665.621306][ T2907] should_failslab+0x9/0x14 [ 2665.621324][ T2907] kmem_cache_alloc_node_trace+0x270/0x720 [ 2665.621339][ T2907] ? mark_held_locks+0xf0/0xf0 [ 2665.621378][ T2907] __kmalloc_node+0x3d/0x70 [ 2665.636046][ T2876] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2665.636432][ T2907] kvmalloc_node+0x68/0x100 [ 2665.641562][ T2876] Memory cgroup stats for /syz5: cache:16KB rss:209460KB rss_huge:163840KB shmem:72KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:206648KB inactive_file:4KB active_file:0KB unevictable:2960KB [ 2665.646794][ T2907] ? seq_dentry+0x2d0/0x2d0 [ 2665.646810][ T2907] seq_read+0x832/0x1130 [ 2665.646829][ T2907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.646854][ T2907] ? fsnotify+0xbc0/0xbc0 [ 2665.646870][ T2907] ? seq_dentry+0x2d0/0x2d0 [ 2665.646894][ T2907] proc_reg_read+0x1fe/0x2c0 [ 2665.646914][ T2907] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 2665.646937][ T2907] ? security_file_permission+0x94/0x380 [ 2665.646966][ T2907] __vfs_read+0x8d/0x110 [ 2665.752837][ T2907] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 2665.758310][ T2907] vfs_read+0x194/0x3e0 [ 2665.762475][ T2907] ksys_read+0xea/0x1f0 [ 2665.766636][ T2907] ? kernel_write+0x120/0x120 [ 2665.771313][ T2907] ? do_syscall_64+0x26/0x610 [ 2665.775993][ T2907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2665.782054][ T2907] ? do_syscall_64+0x26/0x610 [ 2665.786737][ T2907] __x64_sys_read+0x73/0xb0 [ 2665.791239][ T2907] do_syscall_64+0x103/0x610 [ 2665.795831][ T2907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2665.801715][ T2907] RIP: 0033:0x458209 [ 2665.805606][ T2907] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2665.825214][ T2907] RSP: 002b:00007f1227ec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2665.833640][ T2907] RAX: ffffffffffffffda RBX: 00007f1227ec8c90 RCX: 0000000000458209 [ 2665.841608][ T2907] RDX: 00000000000003a2 RSI: 0000000020000300 RDI: 0000000000000005 [ 2665.849582][ T2907] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2665.857549][ T2907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1227ec96d4 [ 2665.865513][ T2907] R13: 00000000004c4dbc R14: 00000000004d8830 R15: 0000000000000006 [ 2665.876532][ T2876] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=2868,uid=0 03:57:27 executing program 2 (fault-call:5 fault-nth:1): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) [ 2665.894092][ T2876] Memory cgroup out of memory: Killed process 2868 (syz-executor.5) total-vm:72580kB, anon-rss:2892kB, file-rss:38000kB, shmem-rss:0kB [ 2665.918145][ T25] audit: type=1804 audit(2000001447.269:285): pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir809430775/syzkaller.3uh0eM/4932/file0" dev="sda1" ino=19490 res=1 03:57:27 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2665.972753][ T1043] oom_reaper: reaped process 2868 (syz-executor.5), now anon-rss:2900kB, file-rss:38092kB, shmem-rss:0kB [ 2665.998222][ T2911] FAULT_INJECTION: forcing a failure. [ 2665.998222][ T2911] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2666.011464][ T2911] CPU: 1 PID: 2911 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #39 [ 2666.019386][ T2911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2666.029448][ T2911] Call Trace: [ 2666.032749][ T2911] dump_stack+0x172/0x1f0 [ 2666.037108][ T2911] should_fail.cold+0xa/0x15 [ 2666.041721][ T2911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2666.047539][ T2911] ? percpu_ref_tryget_live+0xef/0x290 [ 2666.053015][ T2911] should_fail_alloc_page+0x50/0x60 [ 2666.058232][ T2911] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2666.063631][ T2911] ? find_held_lock+0x35/0x130 [ 2666.068426][ T2911] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2666.074181][ T2911] cache_grow_begin+0x9c/0x860 [ 2666.078960][ T2911] ? __kmalloc_node+0x3d/0x70 [ 2666.083652][ T2911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2666.089921][ T2911] kmem_cache_alloc_node_trace+0x658/0x720 [ 2666.095824][ T2911] ? mark_held_locks+0xf0/0xf0 [ 2666.100611][ T2911] __kmalloc_node+0x3d/0x70 [ 2666.105131][ T2911] kvmalloc_node+0x68/0x100 [ 2666.109734][ T2911] ? seq_dentry+0x2d0/0x2d0 [ 2666.114246][ T2911] seq_read+0x832/0x1130 [ 2666.118500][ T2911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2666.124934][ T2911] ? fsnotify+0xbc0/0xbc0 [ 2666.129280][ T2911] ? seq_dentry+0x2d0/0x2d0 [ 2666.133804][ T2911] proc_reg_read+0x1fe/0x2c0 [ 2666.138418][ T2911] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 2666.143900][ T2911] ? security_file_permission+0x94/0x380 [ 2666.149553][ T2911] __vfs_read+0x8d/0x110 [ 2666.153803][ T2911] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 2666.159271][ T2911] vfs_read+0x194/0x3e0 [ 2666.163466][ T2911] ksys_read+0xea/0x1f0 [ 2666.167632][ T2911] ? kernel_write+0x120/0x120 [ 2666.172325][ T2911] ? do_syscall_64+0x26/0x610 [ 2666.177020][ T2911] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2666.183098][ T2911] ? do_syscall_64+0x26/0x610 [ 2666.187794][ T2911] __x64_sys_read+0x73/0xb0 [ 2666.192379][ T2911] do_syscall_64+0x103/0x610 [ 2666.197511][ T2911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2666.203414][ T2911] RIP: 0033:0x458209 [ 2666.207318][ T2911] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2666.226931][ T2911] RSP: 002b:00007f1227ec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2666.235352][ T2911] RAX: ffffffffffffffda RBX: 00007f1227ec8c90 RCX: 0000000000458209 [ 2666.243349][ T2911] RDX: 00000000000003a2 RSI: 0000000020000300 RDI: 0000000000000005 03:57:27 executing program 3 (fault-call:6 fault-nth:0): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) [ 2666.244494][ T25] audit: type=1804 audit(2000001447.539:286): pid=2918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir271241296/syzkaller.aJC36X/3352/file0" dev="sda1" ino=19506 res=1 [ 2666.251334][ T2911] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2666.251344][ T2911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1227ec96d4 [ 2666.251353][ T2911] R13: 00000000004c4dbc R14: 00000000004d8830 R15: 0000000000000006 03:57:27 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:27 executing program 2 (fault-call:5 fault-nth:2): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x223) 03:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x223) 03:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x5b) 03:57:28 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x200006a2) 03:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x2302) 03:57:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:28 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000540)={0x1, {{0xa, 0x4, 0x0, @mcast2}}, {{0xa, 0x0, 0xef5c, @remote}}}, 0x4ba) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000180)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x2, &(0x7f00000001c0)=""/40) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000040) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x2302) 03:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x23020000) 03:57:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x23020000) 03:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r3, 0x50a, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x6, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x811}, 0x20000040) 03:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x7ffffffff000) 03:57:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x2302000000000000) 03:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0xf0ffffff7f0000) 03:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0xffffffffffffffdd) 03:57:29 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x2302000000000000) 03:57:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, r1, 0x80000) getsockopt$ax25_int(r2, 0x101, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:29 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 03:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:29 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x100000000, 0x8000) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x401, 0x28002) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f0000000080)=""/151, &(0x7f0000000140)=0x97) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xff, 0x200800) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000080)={0x1, {0x77359400}, 0x3, 0x8}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0xfffffffffffffe32) 03:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c1221bb6a357a499a08f6e9747ce7b102f2721e29b2c43dfcdc1a4ab87f087ad57f56e1a90c57974537772aef263dfe84d6a551da70e3d67886b1f55168e7b68e5fff7") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0x8, 0x577a, 0x3, 0x431e, 0x6, 0xa5, 0x7}, 0xc) read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$TCSBRKP(r1, 0x5425, 0x7) read$eventfd(r1, 0x0, 0xfffffffffffffe75) 03:57:29 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r3, 0xa5}}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0xfffffffffffffdd2) 03:57:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1f, 0xaed6053d505da4c9) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000080)=""/239) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x103000, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000080)=0x600000) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:30 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:30 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:30 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) setsockopt$llc_int(r3, 0x10c, 0xf, &(0x7f0000000080)=0x6, 0x4) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x183) 03:57:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000080)={0x4, 0x0, 0x7, 0xff, &(0x7f0000000040)}) read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) read$eventfd(r1, 0x0, 0x60) 03:57:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8102, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0xd000, 0x100000}) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bbe613f373bd5f91d080e560af14c145a0a6584f076dc78e269e4308a32480795a98a8f7e6c5f8ff5f6c782f6310b107de5eaefd9924065419b9388a8ff138064478867edac301fda75da8f2561fb89f0776c80b7ba2779991df226401493ce303c45896e8299284c70d55", 0x6b, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x20, 0x200000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) read$eventfd(r2, 0x0, 0x0) 03:57:30 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:30 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="4d000000010400001f00080c7f000001fbffffff0d00000000000000dd0500003f0000001300000002000000a99da3f906000000"]}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000200)=0x7346eda104c9d1cf, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000140)={'syzkaller0\x00', {0x2, 0x4e20, @remote}}) fchdir(r0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f00000000c0), 0xfffffffffffffedf) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r4, 0xc, 0x3}, 0x10) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000100)) 03:57:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7c96, &(0x7f0000000140)="0adc1f123c123f3188b07087fbea06f76d99eecbd0721f1917fb54965396b8ae35faed0b60d9987291cffa73461f3c") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x4e20, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x100, @loopback, 0x8}, {0xa, 0x4e22, 0x2, @empty, 0x93}, 0x9, [0x7fffffff, 0x1f, 0xa98, 0x4e1b, 0x6, 0xfffffffeffffffff, 0x2, 0x6afb71cd]}, 0x5c) read$eventfd(r2, &(0x7f0000000080), 0xfffffe87) read$eventfd(r2, &(0x7f0000000040), 0x8) read$eventfd(r2, 0x0, 0x0) 03:57:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a00ded5d123f98e124670") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:31 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x4, 0x30}, &(0x7f0000000140)=0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') inotify_init() read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000080), 0x8) read$eventfd(r3, 0x0, 0x0) 03:57:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) 03:57:31 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x200000000000, @remote}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f00000000c0)) read$eventfd(r1, &(0x7f0000000340), 0x10000018f) read$eventfd(r1, 0x0, 0x0) accept4$inet6(r1, 0x0, &(0x7f0000000040), 0x80000) open(&(0x7f0000000200)='./file0\x00', 0x400000, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000100)={0x2, 0x5, 0x5}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000240)=""/91, &(0x7f00000002c0)=0x5b) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000180)) prctl$PR_GET_FPEMU(0x9, &(0x7f00000001c0)) 03:57:31 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:31 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x57, 0x8000) read$eventfd(r2, &(0x7f0000000300), 0x3a2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r2, 0x2, 0x1, 0x1ff, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) 03:57:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x7fe, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000011c0)="4ca44e1a3a19300bd1f7b22376f576f82e96f5a6aa9a857d6967597e0d87b79eb7b9c02c5e8d675c0968504dfa54e1c2bf9f02e719635cec559dcf71cc39e0909ea8f389e1cf1efc7f249e55b49e7eccbc25706bd054c4c4e13484f46d6ba1dc521e57d3750b740c96485c851c088d1ff7bf82e56448648cb37a1e236331ffe6a1f3a34abc5bae423d59cda4f9ebcff2c9390815eb99d325a70d6fbfbad6b30b0938d16685e48ea9f592472080ce7e62950ad9c8ad537b0c389617b4368fca49e21382bb7f4a66b994a5b4d96163253f1fd73bc3248f30d3e07f29a4359f2c6a15f18650d3cb7cf018e8bffef84075f3a63da8c937836679d6d4eab2feff1cd8e7ed979a401431337574253c49422ac4f96e45") ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @remote}, {0x6}, 0x56, {0x2, 0x4e21, @broadcast}, 'veth0_to_team\x00'}) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000080), 0x8) read$eventfd(r2, 0x0, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1004) 03:57:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') syz_extract_tcp_res(&(0x7f0000000040), 0x7, 0x99a) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0xfffffffffffffffd, 0x0, @loopback}}}, 0x108) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x410020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="680000008e396c70af625610c8a95310af78fe9cc6a7fce20051f98cf2e10ab28d5d0264d160794791cdb90e2505bf00ba91744fca8967908147b44c0dcc27c45be469f337", @ANYRES16=r3, @ANYBLOB="00042dbd7000fedbdf250c0000004c000200080002004e240000080002004e2100001400010000000000000000000000000000000000080002004e220000140001000000000000000000000000000000000108000700ff00000008000500ffff0000"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0xc800) ftruncate(r1, 0x7) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x88080) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000001c0)={0x3, 0x0, &(0x7f00000000c0)=""/5, &(0x7f0000000100)=""/3, &(0x7f0000000140)=""/115, 0x3000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = getpgrp(0xffffffffffffffff) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/netfilter\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000040)={0x3, 0x1, [0xfffffffffffffffd, 0x80000001, 0xfff, 0xffff, 0xfffffffffffffffa, 0x200, 0x800, 0xef]}) read$eventfd(r1, 0x0, 0x0) 03:57:32 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x5}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000003c0)={r1, 0x100000000, 0x7, 0x4, 0x4, 0x7}, &(0x7f0000000540)=0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xd1a6e33e17b0fa3d, 0x0) ioctl$sock_x25_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={@null=' \x00', 0xa, 'dummy0\x00'}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r6 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x101002) read$eventfd(r5, &(0x7f0000000300), 0x3a2) ioctl$sock_x25_SIOCADDRT(r6, 0x890b, &(0x7f00000001c0)={@remote={[], 0x1}, 0x4, 'veth0_to_bond\x00'}) 03:57:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000000000001b, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/user\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000540)={0x200, 0x9a, 0x1, {0x1, @win={{0x8, 0x2d37, 0x8, 0x13}, 0x0, 0xf4fa, &(0x7f0000000140)={{0x7fffffff, 0x7, 0x9, 0x200}, &(0x7f0000000100)={{0x4, 0x8, 0x80000001, 0x200}, &(0x7f00000000c0)={{0x7, 0x7fff, 0x6, 0x8}}}}, 0x1, &(0x7f0000000180)="35a49be3936fcba5232c8da216ae128394caa02a246d7096d2d44b77257d4c8c3bc13ddff6760ed6f04df88e16a692c378023454cb907ba4f92432b3bc026a8d11f170af2f992b753e6b42d425ee31e30bae17dd56b2a1961a95a558833c3c5651bdf80a12b3be238191c05b01b7b02bb9b5df8a8232aef77e3758cabe28904546711ef7164f297eecbd7c08eb88e950cb704d0895b84a602dc47b531d75a0adb2d93675c89aec078d849be0c151bf6c981f84083593537ead75d861389dd5e027a89248cb2fb23ffd852448c1f745b820217e34e071c1f5b14734dfacf30f34e55db5", 0x1}}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000680)) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xf4) r4 = syz_open_dev$audion(&(0x7f0000000840)='/dev/audio#\x00', 0xbe22, 0x10280) ioctl$sock_bt_hci(r4, 0x0, &(0x7f0000000700)="4698e181ecdba60a6711ab9bd0553a6aded05a93a2bce0058ca411d179f3f67965a145a3bd301cc84f94397b7e5938f05ab56a2f2106c8e249a3a12b478a3ff517b33ee1645c021e1f606ad1e39605ab8640812ac576b3d01b0f9a909b55656c90dec34739c042a665281ff5d4cbe8ca815579f09ac156898efb6d5ea3aaf2c6f0c409c093378441adb77f809f806a58237b31b5d58d14b211b09eea27a9806e63759da991227844ce39216f564a665653b1f17374") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000002c0)={0x5, 0x6, 0x8004, 0xffffffff, 0xff, 0x4c30, 0x5, 0x743, 0x0}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000380)={r5, 0x34f}, &(0x7f00000003c0)=0x8) getsockname$packet(r4, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000d00)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000e00)=0xe8) sendmsg$nl_route(r4, &(0x7f0000000f80)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x20c04000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000e40)=@ipv4_delroute={0xd4, 0x19, 0x0, 0x70bd2d, 0x25dfdbff, {0x2, 0x0, 0x30, 0x0, 0xff, 0x3, 0xfd, 0x4, 0x700}, [@RTA_METRICS={0x94, 0x8, "4db70912295c26e600d9bd23131629e247ab190e698509e12723dab19342b585a20e56bb54e739d7c5c220d2d076d2d01730fa6d692953a397883d4b5b515600401f7f99e6ecd9e2935ae9de88fa17290723a39d8faba8b13430d8069883e167c5b37425960da76784bef9839ec0a386a41e404af065f72745f269504c2dca3cc976cf26575d3e40ad5da3e555"}, @RTA_MULTIPATH={0xc, 0x9, {0x101, 0x5e78, 0x6, r6}}, @RTA_OIF={0x8, 0x4, r7}, @RTA_IIF={0x8, 0x1, r8}, @RTA_IIF={0x8, 0x1, r9}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20040004}, 0x20040080) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x2442, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000440)={{0x5, 0x2}, 'port0\x00', 0x1, 0x4, 0x8, 0x0, 0x9, 0x502, 0xfffffffffffffffe, 0x0, 0x7, 0x9}) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) r2 = getuid() getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x10c0002, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@aname={'aname'}}, {@posixacl='posixacl'}, {@debug={'debug'}}, {@uname={'uname', 0x3d, 'self^lo'}}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@mmap='mmap'}, {@cache_loose='cache=loose'}], [{@uid_eq={'uid', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}]}}) 03:57:32 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r0}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101401, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:32 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r0}, &(0x7f000095c000)=0x20000148) 03:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f00000000c0)=""/26, &(0x7f0000000100)=0x1a) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="f4f8df09f6cc99ae783377f80a26c78146ef53f202c362255aae9bd5e0ea121200d1882e620fa6fe2c031a83222a3ac7a596a90968537f808801c969f0c53a8f5a66f940d0e4e773cd80ead1647587e6d2c08690f95ecf39f9ad4983c30a9e14a0cfc295ccca900b22c63acad27fa2cf8e9970e3b7d7ea97de526e33") getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000140)={@initdev, @loopback}, &(0x7f0000000180)=0x8) socket$inet_dccp(0x2, 0x6, 0x0) 03:57:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f00000000c0)={0x1, 0x9, 0x6, 0x9c, 0x40, 0x2}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$void(r0, 0x5451) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000040), 0xfffffffffffffd8c) 03:57:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000040)={0x1, "bbac20b5597a6675367340268de32a6da2fad56562591c4ae8b630cfb6465188", 0x1, 0x1}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:33 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:33 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r0}, &(0x7f000095c000)=0x20000148) 03:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x172, 0xefde383290d6214) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e21, 0x1ff, @local, 0x7fffffff}, @in={0x2, 0x4e24, @loopback}], 0x3c) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c06000000b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) 03:57:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x8, 0x3}) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f0000000040)=0xfffffffffffff621, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x3, 0xffffffffffffffff) clone(0x22002101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, &(0x7f0000000080)=""/9, 0x9, 0x40000001, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x200, 0x1, 0xdc, 0x0, 0x5}, 0x14) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) read$eventfd(r2, 0x0, 0x0) write(r1, &(0x7f0000000100)="305232409b0aae36748f9bec87452bc4219ff5cfb64bb18caa22103ba86d753b118d7bdeb93e0fb500789c750884ce312f8174fa7da5fe9ea41c0f5b4653fe668fb043ba6915a7d0123e83b6da80c133a78716d5e1bb6bec0f19e5deaaecc04b38fd34551b0327c524f10f550319a9babbc8cd897ec8b38d57cf352a2beb0aa6bf288ea89a4ec53742153cf99ecead4d16d3f6a10c89d6de6af4ca1c6cf5e691f3f929f5732d39aacd1f32478138884806de61534a4e9484c9535d5c38bda7e9908e3a3316d9e36f0146ec58df2bd190b1113165eb285ef6ebd55101a2e5807a134c055f63172851489530515cf8948e71dc8fec17058bea22", 0xf9) 03:57:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:33 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x7}, [{0x2, 0x4, r2}, {0x2, 0x5, r3}], {0x4, 0x5}, [{0x8, 0x1, r4}, {0x8, 0x2, r5}, {0x8, 0x2, r6}, {0x8, 0x4, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}], {0x10, 0x1}, {0x20, 0x2}}, 0x64, 0x0) r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_NMI(r10, 0xae9a) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r11 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r11, &(0x7f0000000100), 0xb5) ioctl$VHOST_SET_OWNER(r11, 0xaf01, 0x0) read$eventfd(r11, 0x0, 0x0) 03:57:33 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) signalfd(r0, &(0x7f00000001c0)={0x11}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x80, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000200)={'ipvs\x00'}, &(0x7f0000000240)=0x1e) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46010108f8ff0700000000000003003f000400000001000000000000004000000000000000eb020000000000006500000000003800020001000004090005000000b04b0000b00c00000000000001010000000000000300000000000000020000000000000007000000000000004300000000000000febc288173733187a3a0e65373035488a1aa47746131f7f4442cffbb8f5f6b0184a7e1b1038d2c7d170d731492cf21683d4f2ba76235b8d5b0b8e494400def5e13ebe980cabe2d70182378eb9c5bdf9d8ab0cca6cd52a02031d9ed9d0ec7753d58f1db0cacb11cdb90bd2f7339e8dceb7c6cdbb8b139885b5522d8d5f1846c65c7c03e9e2dd178b09c70db45069945264b0d977672d4ef4b3a9c02627f39972f369816037f9bd5732e2f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002caccc7c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x822) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) write$P9_RWALK(r2, &(0x7f0000000b80)={0x3d, 0x6f, 0x1, {0x4, [{0x4, 0x2, 0x6}, {0x22, 0x1, 0x7}, {0x18, 0x2}, {0x4, 0x2}]}}, 0x3d) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0xfffffffffffffee8) connect$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) 03:57:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000140)="70f1079a1b4bc552085ab5c391608e55a03acc23ce99caa3eaf9866566ead7ab8208b3d252a268044c90931ddc535c196402f4bcf72d6df9f260273d1e54d1b3f8f3d188658ba084068a0f9b07fe3f5e0b25d2f7e21449ecf0a236cd686931918cf38687076d42dd8dbc11d368f5108ada7d2e95df9aea9165c6032df1c8c75a9bb11ffee597eb6ec038ef58276d6be3f2166046a2c12698d0db568bbce780e7e90a4ad05ff0a626445d68bf405031298ffa5c0fd47e3c2a155e8cf62be322d4a109f08aa5969c9e1855e4a9aabb2c") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) socket$inet_udplite(0x2, 0x2, 0x88) read$eventfd(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x10000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0xfffffffffffff801}, 0x8) 03:57:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a0d69d443c7c47e0455348579212dc3c", 0x10) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000080)={0x53, "16f2d488df77e009b0dbd487304de450dac81aa5f01eca0e7794ff9dca16930914d74674297cf18c7da7b17c53b45f571bc34671c214928bf690a863272757d30a740ea2c5245965f66f9c6cdb9dafa09a986224c9cf3e89612f6b7d5b6d5a08bb9977c88307909d8b1b625294125260e78a8eac2634ad45cf00e7a55c44ecec"}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000140)={0x5, 0x1ff, 0x1cc114b, 'queue0\x00', 0xffffffff00000000}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:33 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:34 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008910, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200140, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3000000000000000, &(0x7f0000000080)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:34 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, 0x0) 03:57:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x100000079) 03:57:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x25) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080)=0x9, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0ae11f123c123f3188b070") accept4$bt_l2cap(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80800) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) read$eventfd(r1, 0x0, 0x0) 03:57:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x2000) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffff7, 0x6, &(0x7f0000000480)=[{&(0x7f00000000c0)="243db51192431b127d410ca65d938c5b40e68f0c2fe70f87", 0x18, 0x6}, {&(0x7f0000000100)="3c7807b9a71b79271d9f3275ccf4cc21af268b0394b17b089bbefba73af6dd4f8bb58b2d2ed5ea1b6694d965449af170e159df5214ded4c3c5e13b3358df54284404837c1a10a8d1de6b5da5d33f7fd5c52983f5895e86ddf5533a8c314e81", 0x5f, 0x4}, {&(0x7f0000000180)="23bd0732bf849b29b6af7f08778d6416cac77dca79ca811a32432392ffe77a206f076d2d1984d0b9374973418f150d41e83999115d393ab54082efe55c34ef25ec51447f05203d1bf12c7f136b4d443f273dfaa1cd0609992ffe40dcc25af637aae34d7a32", 0x65, 0x7fffffff}, {&(0x7f0000000200)="97a81e8c2f10169a01521c74ecdb40742e74ddf17d05bff4039140da1f72da014771210f3ee0170caf91571a37de4999625fd25014d43b832ad86a7078a17afc769f48e72010ff5ab2ea499ed5a81a5c8cf93d1c8da2480a4342f51dae97da5d2510ea330857371033ac0322016d4c667f679eb12a54159eba604d9706d1c094508305b95bb9e98c3ab3da69672bef87227b264e379005598b17e66c002c268f1363d28ea0fa491fcb3deadd474fe3ce1920fe4baf66d4c49be10bd96a67ef68a6bb70a131fc287693a438747488a01c0b39240a0e3b1a4ec3e04cdd20073b41", 0xe0, 0x8}, {&(0x7f0000000340)="0585a4", 0x3, 0x10001}, {&(0x7f0000000380)="61caad1d5c4d2ac3b82b837a7989f77ba397f0f0aadebfb4feb0341483137e2a9c2719df862edca4f97694aa71a94c96c71cbdad133fab87283e6374fe3b15e33d574068efe5087dc93d5869d61a66e2f62d139d7115e55adadced4bd0ef98252697d56c752ac01bdcf33f7c8eef480650d4e78a8e85cb590d42ec4cecef682cfcb14963de6dc7395f63e7fd59966776265b1b6111b5cebf8a100d8b68b0c9aa23588e2eb58107d58a8ff32f84389e84c20c33383f50696772218b5a5565fd7e38237a5f8db9bcaecb3627a1f7acede4c42dea992da4f0094fdeede40a784e8c", 0xe0}], 0x800, &(0x7f0000000780)=ANY=[@ANYBLOB="66696c655f756d61736b3d3030303030303030303030b1e154003034302c636f6465706167653d63fb2bb7bc9739531ec31c8cfb80949c4b708259d84e3836362c71756965742c7065726da9685f64697265637469000000000000000000000000000000"]) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000740)={0x9, 0x897, &(0x7f0000000640)="74c16416092840404a21c4fbb8c3ad85521a3c6f5e93ded3c99a96969eda4721ddeb2e31d8063ca9b0b93d6252dede244771881507bda6ffb3600dc54a2f715ff7f661a6100995b9cde3780e255537ad6f6ec8463407b733b4aa02cc3a835593db8e1fc6a5787f1cee945e11776addc8561370c5e1703dac815fb869b78afa969e8bea1f3f382b8b090107f8b0cb3458e9e1a0caa5aa33aa4fbb7d75ba1164543e7b8245861509fce87f664f3086905b", &(0x7f0000000700)="bddeaf39828e215f4b9e0e184388548df1880f219f81348d7d07e808f61adcaf907ce1288e7ea0a5a1e04ea963a2536383b071e5f250d6d979", 0xb0, 0x39}) read$eventfd(r1, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f00000005c0), &(0x7f0000000600)=0x4) [ 2673.588555][ T3458] hfs: unable to parse mount options 03:57:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000080)=r2) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40000, 0x0) read$eventfd(r3, 0x0, 0x1b527b7318006cb4) 03:57:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment={0xaf, 0x0, 0x0, 0x3ff, 0x0, 0x9000000000000000, 0x68}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x101000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000000c0)=""/10, &(0x7f0000000100)=0xa) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x7ff, 0x7fff, 0x8, 0x5474, 0x10000000, 0x5, 0x3, {0x0, @in6={{0xa, 0x4e21, 0x0, @mcast2, 0x8}}, 0x0, 0x2, 0x7fff, 0x7, 0xd3cc}}, &(0x7f00000002c0)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000300)={r3, 0x7f, 0x4, [0x4, 0x200, 0x7f336386, 0x800000]}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000140), 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x2c0, 0x0) ioctl$VIDIOC_S_EDID(r4, 0xc0285629, &(0x7f00000001c0)={0x0, 0x40, 0x9, [], &(0x7f0000000180)=0x401}) 03:57:35 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, 0x0) 03:57:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) chdir(&(0x7f0000000040)='./file0\x00') ioctl(r0, 0x5, &(0x7f0000000340)="0adc1f123c123f3188b070564003a61b3aa7efe4dcf41b29a9414eceab46b73c1ced8e1ec9a7829bc59a60e49e9808b47045fa1c26765cf99a2d1f48a0a1ce13a1bba799eaaf383f0484c68ef8eee2c446db52c80256e8d8e8924ce2d0f43af85a721c429736dc2488d672fa2a79553d234d7b981dac0731fe37a15f7637ab9ce4841a0cd45712b73e2963ec82e2a3f2bdcbf6d2fd3f47b5d358b2b472412049718ae651c277ac4445e8c7ccfb5e2d") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x300, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x1) read$eventfd(r1, 0x0, 0x0) 03:57:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x2400) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000100)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') accept4$inet6(r3, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x80000) read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) fcntl$setsig(r0, 0xa, 0x13) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x3}}, 0x18) read$eventfd(r1, 0x0, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) 03:57:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0x800000000000}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe2$9p(&(0x7f0000000280), 0x0) epoll_create1(0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:35 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, 0x0) 03:57:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f000095c000)) 03:57:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x10000000000000e, &(0x7f0000000040)={0x9, {{0xa, 0x4e20, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @empty, 0x9499}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0xe, &(0x7f0000000080)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000040)='necfilter\x03\x00\x00\x00\x00\x00\x00\x00\x9a\x81_\xc1q\xfbQ\xd5\xa0\x94H') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:36 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, 0x0, 0x0) 03:57:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0xcc, &(0x7f0000000040)="c4f96855bfec717d4d54c9d9d929c08ca70dbbad1478d4c9ed865471210975d3f45970226d09c7f2487f7f59b8b1fd659b32bf3cc1652cb28a3c74414d69cddedb5feb6ddc8fdc41771de54dd04ac4592d2e637a788209b2bb2eee5996daebd47eac2d6c108b98f71313a0d3c0c2c81df85a85e3ef8f6341757addcf677940999c41c785df20e34640095c997bf87dcbb9fb7208d416ec9acb2cdacb2c3b161dd4906db6d7", 0xa5) 03:57:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:36 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/51) 03:57:37 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f000095c000)) 03:57:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0xfffffffffffffffe, 0x7, @remote, 0xfffffffffffffffc}}}, 0x108) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/ip6_tables_names\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000240)="af0e6c882d8be7229c921159827768fd3279f7cd6c5ecf199cd7cda8268cd6a60513aa77a8e08443b45704deadf325a07640255e26efb9d33063c8d26b85", 0x3e) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='\x06\xcar`R\xe2\xce\xb0\x87R\x1fnet/\xe5`filter6\x00\xf9A\x7f\x95\xcf\xc1e\x1c\x9fN-\xcd\x8e\xd7 \x9c\a\xc0\xc0\\=\xc2Qj4\xc1\x91\x15\x9a\xfe\aVY\x85^7\xfeu\xeb\x84\x8fA\x1dX\'\xf8\xb2\f\xa1\xfe\xd7\xbb\xd7') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000880)=ANY=[@ANYBLOB="cc020000", @ANYRES16=r5, @ANYBLOB="020825bd7000ffdbdf25030000004c000900080001000000000008000200010000000800010001000000080002000900000008000100020000000800010001010000080001005900000008000200070000000800020003000000540004000c00010073797a31000000000c00070008000400070000001400010062726f6164636173742d6c696e6b00002400070008000200060000000800020000000000080004006f2a0000080001001e000000680007000c000400ff0700000000000008000200ceffffff0c000400010001000000000008000200000000800c0003003f0000000000000008000100040000000c00030000080000000000000c00030002000000000000000800010003000000080001000000000008000600040002003c0007000c0004007f0000000000000008000100010000000c00030098000000000000000800020000800000080001000300000008000200030000002c000900080002000500000008000200aaa60000080002000100000008000100010000000800010005000000c40001001400020008000100030000000800010014000000100001007564703a73797a32000000002c0004001400010002004e217f00000100000000000000001400020002004e23ffffffff00000000000000000800030001000000100001007564703a73797a32000000000c00010069623a68737230004c0002000800030009000000080003000000000008000100090000000800040007000000080002000700000008000200040000000800010018000000080004000500000008000400070000007c00010008000300050000001000010069623a726f73653000000000100001007564703a73797a30000000002c0004001400010002004e24e000000200000000000000001400020002004e20ffffffff00000000000000000800030001000000080003005e0000001400010069623a69703665727370616e30000000764189867562b37d2fc3d3eec07218948de26e1aefebabffc01566e56b6e730ed18d9f25e52b6f597ca7966f22a7acb2449f280b26e3712d4bd64f6b794e50315c325d9c4aa777f6fd8e4edc00c4589c7a841ddd0d9ac51cbfbb7e62203caa785543ba734bb0aa12bcc71ddad6277e9a"], 0x2cc}, 0x1, 0x0, 0x0, 0x8050}, 0x0) 03:57:37 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:57:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) read$eventfd(r1, 0x0, 0x0) 03:57:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800, &(0x7f0000000000)="dc0004004000000000") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="b7bd129ca6dd0ef5215fc415335c89c154b7f43e79b1c36b9c60be37b4986baaf0b68c05837f58bc5705bfe843130515b2d5e00bdfb29e99bc0205b9ffc5beaeefe7497c0c670e9d3cca57a65ebe", 0x4e, 0xfffffffffffffff9) request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='(\x00', r2) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r3, 0x85, r3) read$eventfd(r1, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={r4, 0x6}, &(0x7f00000002c0)=0x8) 03:57:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80040, 0x0) finit_module(r3, &(0x7f0000000180)='em1/userposix_acl_access$md5sum\x00', 0x2) r4 = openat$cgroup_int(r0, &(0x7f00000000c0)='rdma.max\x00', 0x2, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x9) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r6, &(0x7f0000000300), 0x3a2) 03:57:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40002, 0x0) inotify_add_watch(r2, &(0x7f0000000080)='./file0\x00', 0x80000280) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/relabel\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x184, r3, 0x220, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x512}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ea8}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x434}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x96}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x58f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8998}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf610}, @TIPC_NLA_NET_ADDR={0x8}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8004}, 0x8840) 03:57:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f000095c000)) 03:57:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) write$vnet(r3, &(0x7f0000000240)={0x1, {&(0x7f0000000100)=""/131, 0x83, &(0x7f00000001c0)=""/84, 0x3, 0x3}}, 0x68) 03:57:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xc0282, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r2, &(0x7f0000000340)="ef7577036897eccfa51071ed125225b3f1e1ff49897c90c7492c3ac69c8349f019b4fd20ef62546073b557fa21db32bef89c2ad2f13940424d0ec5c7a31bdb3a557ffc7c1435785c34707602d5479bd985af0e2deb9abda043fed5f3dbd069bbf3b3912a74b758b1b83955d62aa2e38a0470073f43ac1fc877cbfff20688fdfac816d4473e750368fffd777b3bf837c7265c01ecb86f4550123ba82c1131f095bfd9", &(0x7f0000000540)=""/55}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000100)={r3, @in={{0x2, 0x4e22, @multicast2}}, [0x3, 0x1000, 0x9, 0x400, 0x2, 0x669b, 0x5, 0x1, 0x80000000, 0xfff, 0x0, 0x10000, 0x4, 0x0, 0x3eea]}, &(0x7f0000000200)=0x100) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000240)='net/connector\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) 03:57:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x100}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x1, 0xe0a221b16ae747d0, 0x3ff, 0xef4, r3}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) read$eventfd(r4, 0x0, 0x0) 03:57:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:38 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0x0, 0x54b3, 0xffffffffc222a068}) 03:57:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000001b80), 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$audion(&(0x7f0000001bc0)='/dev/audio#\x00', 0x9, 0x4000) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000001b40)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) r5 = getpgrp(0xffffffffffffffff) process_vm_writev(r5, &(0x7f0000000680)=[{&(0x7f0000000040)=""/250, 0xfa}, {&(0x7f0000000140)=""/117, 0x75}, {&(0x7f00000001c0)=""/253, 0xfd}, {&(0x7f00000002c0)=""/61, 0x3d}, {&(0x7f0000000340)=""/81, 0x51}, {&(0x7f00000003c0)=""/27, 0x1b}, {&(0x7f0000000540)=""/157, 0x9d}, {&(0x7f0000000600)=""/86, 0x56}], 0x8, &(0x7f0000001ac0)=[{&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/74, 0x4a}, {&(0x7f0000000840)=""/97, 0x61}, {&(0x7f00000008c0)=""/43, 0x2b}, {&(0x7f0000000900)=""/198, 0xc6}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)}, {&(0x7f0000001a40)=""/106, 0x6a}], 0x8, 0x0) read$eventfd(r4, 0x0, 0x0) 03:57:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0xfffffffffffffeb3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000180)={0x3, @default, r2}) 03:57:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000000001, &(0x7f0000000000)="0adc1f123c12f90882c470") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote, 0xffffffffffffffff}}}, 0x108) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x4, 0x282002) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000001c0)=""/32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r4}}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) 03:57:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc000384}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='?/\x00\x00', @ANYRES16=r2, @ANYBLOB="00002ebd9c00fe02000000f4246c2148ee7ca40000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000040) 03:57:38 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0x0, 0x54b3, 0xffffffffc222a068}) 03:57:38 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x4000) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f00000001c0)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12d88088b07043a136c12b85cba03cd54d5f6799090782674dc230668a9188b8dab39fbb129772775d6eb2e7767bfdcde4b361ea36811f4e350c06f8c2def2a6925389e0d0cb94633440a85e0453c173ffb566adc223c0cadb3310c454460a123d69460df7de1bb2f7cecc8c17c5a2754dd94aee35f5b33277c551713f175f2155f6c57b22921f982243d1a0899481d5a149049d4cded67fcc853eaef4aeb65ece383e8f7ab2817fa8f8aafd4824d480ec9c60a06b5d116bba36ae054762312504c0eee49067bfe4d3d67a48c1def19b84ccea") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x5832c0, 0x0) ioctl$TCSBRK(r3, 0x5409, 0x0) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000080), 0xfffffffffffffc54) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) read$eventfd(r4, 0x0, 0x0) 03:57:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) lseek(r1, 0x0, 0x7) 03:57:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl(r1, 0x2, &(0x7f0000000140)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000040)={0x7f, 0x1, 'client1\x00', 0x1, "fefaadae59a4cb82", "0786e14c91d8e592b70aab5e95a64970b8a26f83d1beda2645ee8f1ce377f5e1", 0x1ff, 0x9}) 03:57:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x800) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000200)="df19b736b8a847d1c3290d6cf5733130c4ed0f0be4a84ab52d57f84aadc4549318d8560dcfac11b7a8b29d4f0b48f6a3c6b139d4f25792ed30ab7048d69e04212c3b185a70da547d565a18c2ef15e05382a3476610873bfd056f1c55e5d5c5", 0x5f}, {&(0x7f0000000280)="5a1742957a339b441d87092fe0c864509f0878591f6124289f96bc2b6a0d45ca89a48bbae00b61f65395c3ef51e18eb3ce7bea7d0208881dbc970ca02deb6e2e0f1435cc991e1f143e9c121b148f4147bec72095545d24046a48d53887b5d259cda5cf2090040d7e05d9eda4c2", 0x6d}, {&(0x7f0000000540)="d2863115d0a6449658c8100518926010a446bdce981efd814aaf5fb3806c206f3a33aaba44aaaa194b6a06545b505471da274afbeecaa2aee2ccac2ffbf5656816b1fecf7c8e10382d766cf2ebac6bbd25d73140a9366e9d9c495ce96d81a44ac9eccda81ee8ef3d7d0852d8d68635886ba3143659653eaa581fd45c55b688ea81c27a097e4f3b427bad0089a085e86a36d78083e1b64af309720048afbf2bc56db49fd47957df8ababa9bb7f18bd940a5c092d02983e05a744c2b2c7df662ae718b9c30dd2adc0a4cf8128e8c9461ab", 0xd0}, {&(0x7f0000000640)="2f4b4b9b849b1824fb4a7ca22f10ef86461a59a4f410a85ea090c8b272c441a572897feb7b48542d96596de6cac7eaed577c47b21ffb8b4ae32fbb9587cbda10353556750bfce7840e61f47dc0538fe0936430ccd34a3a89285943e2f7761b8ae7efe6c1917ace99c104d9eb3a475f8d7c1733903a4e79c91d3ab0ecb043ad8528ffdd6e7c14c217fd7eb4b5d9f54461225290c47db951f3d52e0c531c00d09f4cde80dba78a980ecb02a57ed2cdf68aa0965b2842dfbc1bd6bb35cf3f213a6ac1db417949af702031ba6572f7761a7fcb38", 0xd2}], 0x4, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000080)={0x1, 0x6, [{0x2}]}) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000100)=""/247) bind$rose(r2, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @default}, 0x1c) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r2 = getpgrp(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, r2}) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2, 0x4}}, {{0xa, 0x4e23, 0x0, @remote}}}, 0x108) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) lseek(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}}, [0xfff, 0x3, 0x1, 0x3f, 0x8000, 0x100, 0xf9ae, 0x80000001, 0x1, 0x7, 0x9, 0x9, 0x100000001, 0xdee, 0x3]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x5}, &(0x7f0000000240)=0x8) r3 = getpid() fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x1, 0x4, 0x8, 0x1, r3}) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0xec, &(0x7f00000000c0)="2e50a34bea2f4da9327b08e166f0ae0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) ioctl$PPPIOCDISCONN(r2, 0x7439) 03:57:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000180), 0xfffffffffffffff0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x101, 0x6, 0x6, 0xa8, 0x9}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)=""/101, &(0x7f00000000c0)=0x65) read$eventfd(r2, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000140), 0x8) 03:57:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40000, 0x10) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000180)=0x0) syz_open_procfs(r3, &(0x7f00000001c0)='\xd2\xb0cV\xc4\x9dWalter6\x00\x03\xb5W\x12>\xbds1\xb3\t\x87\xb2\xfa\xd0\"\x8c\xd5\x88[z\xb1\x83E\no\\U\x9e\xb8\x9a\x8b\xa0\xbf\x97\xb1\xdfE\x14\xea+\xdaO\a w\xd62\xb8\xfc\x04\xdf\x16\x80\x1e\x81$\xb1\x95\x13<\x1e\x8bU\xe9\x80\xbe7t\xc2V\xceCs\xc6E%\xc70\x90\xde\xc4Y \xb3\x13\xf9AP\x12\x0f-\x19\x05\x8dP\xab\x8b\xe3') read$eventfd(r2, &(0x7f00000000c0), 0x8) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) 03:57:39 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0x0, 0x54b3, 0xffffffffc222a068}) 03:57:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x301, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x0, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) arch_prctl$ARCH_SET_GS(0x1001, 0x8) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0xfffffffffffffe78) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000040)={0x9, 0x2, 0x5}) 03:57:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x7, 0x2, 0x8d76}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2}, 0x8) 03:57:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0xfff, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000280)=0x3) r2 = dup(r1) write$P9_RRENAME(r2, &(0x7f00000002c0)={0x7, 0x15, 0x2}, 0x7) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000240)=0xfffffffffffffffa) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in=@loopback, 0x4e24, 0x59c, 0x4e22, 0xfffffffffffffc00, 0xa, 0x80, 0x20, 0x1, r4, r5}, {0xa3, 0xfc11, 0x3, 0x7, 0x4, 0x8, 0x40, 0x572}, {0x2, 0x101, 0x7fff, 0x4}, 0x1ade, 0x0, 0x0, 0x1, 0x1, 0x3}, {{@in=@remote, 0x4d3, 0x3c}, 0x0, @in6=@rand_addr="ff18dc2fcbaebac62467fc7f71ceb02a", 0x3500, 0x4, 0x0, 0x3, 0x3, 0x2, 0xe8}}, 0xe8) read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x5, @empty}}, {{0xa, 0x4e23, 0x2, @rand_addr="482d84065ab33a03b3ae54d60f50b7c8", 0x7f}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000080), 0x4bf) read$eventfd(r2, 0x0, 0x0) 03:57:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/mcfilter6\x00') pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) read$eventfd(r1, &(0x7f0000000300), 0x3a2) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x66a, 0x0) read$eventfd(r1, 0x0, 0x0) ftruncate(r2, 0x81) 03:57:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)='\x00\x00\x00\x00') setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x6, @loopback, 0x842}, 0x1c) read$eventfd(r2, 0x0, 0x0) 03:57:40 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xc3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") get_mempolicy(&(0x7f0000000040), &(0x7f0000000100), 0x8000, &(0x7f0000fff000/0x1000)=nil, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') lseek(r1, 0x0, 0x7) read$eventfd(r2, &(0x7f0000000300), 0x3a2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) read$eventfd(r2, 0x0, 0x0) sync_file_range(r0, 0x4, 0x12, 0x4) 03:57:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$selinux_validatetrans(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:crack_db_t:s0 system_u:_t:s0 18446744073709551489 /usr/lib/telepathy/mission-control-5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x77) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:40 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0xc0000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$eventfd(r3, &(0x7f0000000300), 0x3a2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000540)={{0x3, 0x5, 0x3, 0x722b, 'syz1\x00', 0x6}, 0x1, [0x5, 0x1, 0x4, 0x4, 0x8, 0x4, 0x3, 0x4, 0x2, 0x1f, 0x1, 0x3a40000, 0xb34, 0x0, 0x8, 0x3, 0x7e, 0x6, 0x100000001, 0x3f, 0x4, 0x1, 0x932d, 0x40, 0x5, 0x0, 0x1, 0x1, 0xc000000, 0x1, 0x100000001, 0x1, 0x9, 0x10000, 0xfffffffffffffffc, 0x0, 0x1, 0x6, 0x8, 0x0, 0x6, 0x2, 0x5, 0x98f, 0x3d2f, 0x7, 0xf50, 0xffff, 0x8c, 0x1400000, 0x9, 0x6, 0x80, 0x1, 0x80000000, 0x9, 0x800, 0xfffffffffffffffe, 0x5f, 0x7, 0x5, 0x4d, 0x7, 0x81, 0x101, 0x3ff, 0xffffffffffffff03, 0xfffffffffffffff7, 0x9, 0xa258, 0xfffffffffffff800, 0x5, 0x0, 0x400, 0x3, 0x1f, 0x80000000, 0x2, 0x0, 0x9, 0x4, 0x0, 0x7ff, 0x3, 0x7, 0x82c, 0x7, 0x800, 0x2, 0x2, 0x0, 0x8000, 0x1, 0x1, 0x5, 0x5, 0x200, 0x1, 0x7ff, 0x6b865414, 0x2, 0x931, 0x7f, 0x3f, 0x0, 0x0, 0x5e1e8570, 0x78ee3398, 0x5, 0x1, 0x5017, 0xddbf, 0x7ff, 0x1f, 0xdc, 0x8, 0xfffffffffffffffc, 0x81, 0x10000, 0xa0000, 0x7, 0x3f, 0x6, 0x401, 0x1, 0x9, 0x9, 0x10001], {r4, r5+30000000}}) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000180)={0x0, 0xd000, 0x5541, 0x7, 0x10000}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) read$eventfd(r3, 0x0, 0x0) 03:57:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:40 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x72d5, 0x200001) write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x0, 0x4, 0x3}, 0x101}}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000040)) read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r2 = fcntl$getown(r1, 0x9) prlimit64(r2, 0x0, &(0x7f0000000040)={0x8, 0x9}, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f00000000c0)=0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000100)={0x47, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e21, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, 0x1}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x96}, &(0x7f0000000180)=0x8) read$eventfd(r1, 0x0, 0xfffffffffffffecb) 03:57:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write(r0, &(0x7f0000000540)="eebf3a62a0e941b372fb8afb40b12d165e15f31b77356595152f8f4544105c341b6b2d3be8ae3c1adb7130c22cd61cce73b3e1286e09b23f98856aae3aae3ee97c5797a9edcb7c6ed2ca0a64965b7b323264b8adf9b52cb1e65ad8f246ca924b71be4d2fb166889392b1b1503dbdb74cfba35a3ef8004e523ce34f7fccb55fc4655d9f493cd02edfac7da277ca908d7a7ad34eac8e1cadd95c185cfc269e9daed587df801a7ab51e864d4a2b073718fd467d5dc4acb22b9a2fe6257896ced9de1db439595738f21d93f0da4c4df2a6ad5c2c64fda9c80f3a56f5742251e2c62fe0329fbab3910a500d9771ee60e7f25295bd2484791c8605aed8a78f2b08337de4a4acf2cb9bfedf0b146d24228e1687507f13072abcb8ff394bfc408feb336dfb9e78e0d8789e6842b0e50fabd1af02cd49ad06ccf6bb2f25f189e2a3b7cf1c57eb2a31f77a358513404b5d5a70c590664f722508debe31ff9cca4cc5d7ad6920f74f0fe60e7f770f36db4d74563bf3a7e989d9c26c03b7f9d9bc069b8f8f4e53f5f21231ca7ee6cf51a47777dd5edf138dbfa73157ab1a2d80123986f76a4eed2400544dc9fd0638bb09426ec77b8439d7e25ef000ccb7cc5ed97cde2958e316ea6405f4581a0e6f2bcd2939459aa861ccd03a8e53b2e78558c29c24ef59af5a8104a7decad0863c32482e8e88fb8cb15ab52ef716cea7bbb1b69c6431628c42cc1d5a9b6674a1d5027ce452b95fa962d1e4157710e999e7993d5eadc5b9dab0bd979d12155157216908f5aa374939ba3d479a1cddc0b87c2425d51cf6b6feb91481968e059dd3d94f16f42a56984b590c514f33e2393321752c85410db4b450a1b1130e4991312c8a970bfef3ed0b7e1313c6454ca395a79e7c205dd18b565ed5247287fe87df28299be8dcb75e0201351e611ce30a166b39ffdf26b6c6db37ab37ad73aec57ee437e5a99502299cb3a6d1f90a797ae46010ae500d0112ed43870793c479935f697daf163a9675548671285c0643aa56f2bfaa9ade980aff0600160d0abd335f6427d08c2cb269d483a82e92c38ca42c9e982e6ecd2b36d01491dad0a8ac3455f405ddbed47d2ea80a9f90c90cc600a487fa7b12b22c977d5d9b2b3b4e692d7d89c1e68b505473160715bb4066214fa84c958c59d87067296c59f7fb2b272ece50ee1385bd0e494bbcdd98fab3140b4cab80de41fc5ed37def05ff1dea31c245488e9a4f135794053364a8dccfc749ca7c29ca27f73261e9aaf7f3eb3fe4b4e5468cae28f20cd3589f0cdcf068432dadd0b20c3f9fabd4b5ee2c6615db51691d57b696594fec462d2aaad03f8b32dfc41aae84aa81426c499403b6b8078af18a1b3c5d23a648f4bad6cd60c900c8318c3826844aa6c9e4c94a78835927842979a7963621773d781d8dc6a84865b6d761e077615684970157f983fd7c5bc193dce8a7db9d3649b06fa8f7f0cbd0756401b3ce82bbe72c6045926ea5852226d46fcf5424b4584cd4f8492ed6b98f0151b2d54c5e0a7aaa03cd970cbd9a0b37a78bda95c41be2d3fd19842187ef11facee97f068b77b61f9b8c17da38336128b5e04f286431fa5c07364fd31b762dd4caa9de86ec4714cc3244c2cb02bbf1211f6a34841f755e406b1b26f29110c8ff9c310a6b62ca1fa80b8d6c21a26af6061607fce6a6379638f72dc23f7b99f814858a93833cd86604a097cedcbddf881d630c4fb1ba829e6e4eeb5da7c9fb04ab1f9929975dbaf4319f5390fb3fe7c888a859b6d40e600204cce6fe68da9f3d319b95b2a7755dd73e18afc8c4741cf62a34bb99c521f659ad34b4fecb7c07f5d6a6f4ed96f7e89e4936f4f6b08ab54564d4ce7f62e5bd515d80e6b6bacbabc8cc7dc62e79ef024d624cdbf9603be076c361b6daa5d98bbce47f8776c69e8126af6345240904914718a412aa5ff2309c464fc3ef5cc45ff5e5c7a52ca8a444f961cc3ddbca3a165d91d965d27a0f69e05b51536bc4113d9b87e2395a7e0b69dc41c96bffc0def7e6c66ad7751eedbd37f6ceed1f1df11fd968f4c86b041c567f0152c287db28a3956ab6e633c15d66caba59cd192dd24f30fa09d4fc77b98da7d1e7e0361ad8b1b4ff57f9e2509308e0b8906525d8c04fc7c88a3f5f6ceca82af635780bc213ae0cd7baba12647eb5f1a64ff24c4900c5491e6b435a9903004fd6ef4e6a1d70a239c5f7c8b7b4838492e761c2314aba9e3192030dc156798a7e76f00df403ad8b863626cb5f3914f32ff145255d659b6640c680daa1a2a9a0974d24412d3bfc5d22be3b780a7342fa43ba8c4bedffa63adaf8884d099b2ac3a6014802917218ac8b552a5a14d12dc66bced19b92ff7f9263328a2393a8339f6a310d27a0cacf8ce89f557a46171816a084cda401c4dcc1cbe4dfeef9fd0effb806e04df3aa95a83e75f40ca2a3387d7e35e1a2eaeb0d23ff9da105ba4f378a3a946438530674e61c623fcc9ffe32aaaec63c1b65558f37f2201b7eec74615c087de99bd187a3dff8d355f66002d7e2ae41fd325fb2f9aae703057dfa8dfd76ca7631e275882167c9eab6391f18798c1db2e23e0025a00e1188b1547081b0882fb1808b5a8e05aed0d1e59408013e421226d0a6e10364b090531c243339d85124cb87f8ccd2c372a45876499e15be9fcbcb09bd064f32550b56723944877b38d1e9ae79e2e5e8448311ec7ffd93516f277bd0c765772f6a090c3ce015e07cf592e994ff158101cdf5b00e8483cf89a962cbe7e7cd79558c716726cb41e4983ec603caf1ad055623da6ff6894dec2daa4607c9cfaab8098a8d061b20b446e731de4a72bc6c25026bb5d803737fc9b818e58ce8cffc6543106eff9c994aaa670fec78313cdc444d76fd5cf8909cd9329953d66a09b9c3a77c48ec9bc0fb7d5857e30104840e87558f149dea393e57f4c73123444a0f48d75161d3beb2b0d8a5205e04931859d9d6540e698294a5048a9040c017a6631addcc765a114500f4aa6938489fdb69f5b270874b0d2f88b2efcaf873bed342cd970c91109cd0e2a2150e75bb1a74db76f26b1b021f29eec80b0d2033abdfc49c831ad7871eaed6771ecfe61888c4cb1202b6a030d79c1a29d3ace7d80ff164b0e84193758aaf262c7020f7860c1522c9d7784aace0303f84dfdbf8534fb7f15340301c62bcff2578b0d4ac8e095a42c36495e0b8602ff1e10c53ffafe505bbecb8669d3ffc961cb2682249f3b38999cbf22cafc37ae2b063c10893b91c3300b805185add4af18eabd9ea9f34245db34e6be5f13cf83d6334fad68cc4a3ef701baa542cb5a2a48876e12f5c955c9851842ff4b4a1a05db1e28354e69a20f86ee811c8752ae86e080761920d2a5be92e06f9d69fcc517148d8d659aa357bfe8e629f99748cc808bd8628b9402955345b643460f64749bbe85c2f32c158f91b997b8504f4cc5790ab9e503abfa1be056dc94b53ebbc1b26b015b931f6b6bf6ac82fc29309bd540bd5f37af7776ed1dbc427228d9a09be29c5e5cc3cec01441365551fe2cfbce624b8bbbcb1c5a7cd319cda98c44208e2ba9376e8d84f7c566ed1712d6da21c9975106ed79f3d94affb87bdb9ad17acc48066a65ccbee30da8002ef576393d68fbbc749a2880b5dabc93956dcdf88506798debb561ff26803cf15bdd9f9ec0d5dac844b65d820ff81101473865f2d2f29216d408ec7bb456558fd94959df4513bea0819f16fcc18d6fd3cbc5f0e256dbb84483ba0b569773314acd58242c23b8c4deea030ba5aafb98985e3f1b3365ec5075fb14d5add8573657c33b59634b5fafa948e7d8d37547153f470d0946e7660fd95352f91fad74721204b96c2aefc021c1b5a7ef17a9592285f7aa04ade17edddbdc5bd726b354113a85b34b49d36d9a1cbdbf342f707751f8957c03be5efe6d5edc3c9dde4708691ce20f46f4c60b7b931b146cef0d8412181d428ce9d7ab8b49fe31abe784c8614ab6fff4d23a15beaadd6c65351fb46fd4ad967a1107407cf3fa7249adb5b159d1d7a87f84245508c108e9002aefbc346927953bab14d3c4f8e919f658806043cfcccd9249f2ac645d4d663d8ba6ecefe24f0c144616e33ec4eca218529e94cd6b541d4b9ec6f5f492f21263fe98ed5e76318bb747fbb78f081e977bc7ffe9e2aa430381e68d9024e7e41e0aaef391dc4e9ab276a37d413abdc18e26428584cdf3b063945be56e46904f6c83cbb56c176271a22368eff6e4af5f2b32927f593208bff1315d7a720aa63e67ffe9cc16a9c77ddbc2bfbe7f2c2fefb0eb49af1220f9a0f5cb5073c7f91733dfe897ea276f45b1a74e02c688767ceeae33c84b04209514468328cf2868ea719db922d49274b3ccefc9a56e1cb21d07913b354960eab5269bc365ef798bf8afc58e942a98db277b53ec90125ffe302f966df7f046a94b8c0e7f6d64bc24cbd6531dcfa37018cfab67af0d063aa2ceb30a1510995efd1ee7c53541bf129fb35f0522ce2d5b3852d92215d0a53083d05854118a8ed5deba43c11a781dc68fd3be7c297bc000fb29d2a90664e91fb708e0d099cef54921b597e491cbb72bf1bc4ce87af7dff55889b9b145eb279db2da5a4ab32b4ef6a6e4caa5ce4721b4d5deb25ac0ed8e17e19047db24a739dae805cb1405c830f26e6d02d73f0e0f5e187507b8945090b44177f6aa3ca2c683a15c6a3cef961c6c49640f2dc22dd2e85a2c24ddc5dd117d9a283f28e464a79cf4354648c46c86e5dd0a670829ad0308397fcc4bc0abacab6970313a4a22544cc858254d93d5ac93b5bd26b248b2ab8de319548c757b8c026ec69e08e85708fff6130d824a929814cadfbf9039d922c4e5703b284f34c4f9339ab551d64c822c069a2598b2e88f872d0ffb48b63a25bdf19cc9588ef146b33ef64f8f7c3f4be2cf68eda4d4a9ec13d0b7f764e309014d7cf46f1e5c40bbd53b60b1ac3aa8aef5e0de5e553b198c9d60aca705401ce12c30a4ecbe495c08ad6ce86081fdba0ea0bce4662e22b0d760b224a3c9b1b2475eb2cc23c5b3096a0d41091f898abc5f3a1be9f32dfb19d55eb7f1db9b0612010d23e0c8fdf8a4f223cebb062296a224c797a9576760352643765a1970766ee6a23332ad3632807320bd4ae639c7e81c3f281920a7956fbdcd950a75fc9acdfa5d540c381dd57dfd0bd9675464c51f3b120ad1b78854c07fbc97830d1121b77f61ea77b0b6a51f251cc887bf8935a7f5e4d1ed11665d8895bfbe6a3678c7c5b61e14b65fb43cdd715aae9863e7d8c89a13fe212337507f47f00ebaf4ceecd0fb70bea5cbfb74782a04d38c2f9671f943b41c300e743ee59fa8e41335f6fde9bb4ea94fd381236864b4e039debcd5f54d750c89090e48d821d757a0b98afa1b808e846b509fa9f2c1c28a84ddaa3eaad1fe57a39cbd94b8428bc2e8fda14531e840f658c26e25cb1f2de871a321863dbfb3d77e2b8c19479ba9089960c479b856fa965a041854fe4d07e3be254e27b039cea80e46a2fe6382e18dc0221547d74634a43fd1b5082623ff459bb4a29f51519bb9ce3917a3e1da367fe89526829807854e2faf8d65663e19d4d6bbf185d94473a730b085233bf4f2173f9fe93648a02f549e38d201fa23ff3fefa4809b2c027e7649f3f389e9613717c55abc9a74567d3d42bda8a2dc71a6b6acb3ed15f5d0e193bc28069e0c9cf4d4931c596fa4be292457584da903eed34399751c338005b1d8dee88679a2ef81c4eb7284f70ba33f01c5d197ff9f8b50dda72025ca460e4ff77", 0x1000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x2000000000000, 0x0, @remote}}}, 0x108) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xefa4, 0x1) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x28, 0x0, &(0x7f0000000200)=[@free_buffer={0x40086303, r3}, @clear_death={0x400c630f, 0x3}, @dead_binder_done={0x40086310, 0x2}], 0x3d, 0x0, &(0x7f0000000100)="f0c7836d92c5eff3c8787e6f06f1efc9acbc409ac6870d3eaad49acd19711521e975dccdedd74ebf11126cac4a06e757c72bc31bca615a8f1860b3bc8b"}) r4 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f00000001c0)={0x4, 0x10000, 0x5, 0x5bf, 0x5, 0x2b2}) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) read$eventfd(r5, 0x0, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000001b00), &(0x7f0000001b40)=0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x8, &(0x7f0000001a40)=[{&(0x7f0000000340)="8831553fb0d8e2a28c35b5d812f916034fd3207378f9a0bc2661cf6b5c6bce5c37d94ad639aea2eaa187bb9f6f4048ef13af0de9de971a1227b93120532d118e2d5d175ec7748a9b93c6cf87bec567971c2854cf9f94c993af4057a0f06fd7f3fac1229aaeee9841a21c681d26d7690278958b1fef433bcd85e8edeb9e807bae105838", 0x83, 0x1}, {&(0x7f0000000280)="cf8745445f3a7fed579484f2e32625a74e42fa1f5e942bdec0e0f939d62892c6ee29a3b2385fcf76556a88", 0x2b, 0x3}, {&(0x7f0000001540)="7872c081a3a4de465bf0d54ce487b9090113324b3c60bcb4bcd65233382bcb7c36ad480fe724078a73c6defd5b543bee9090efc19e996191ac530950c7d429aa184ee2e4f17dfaffa4de37ce1fabd68d46814647c2c1d0ec522155374d56ddfa40e5ce41ddda01e88ee4636cfbf7c02d7976a791dca0b913a586f7d4af388207810285bd73ee404cd713d1b264ebf1327c70ba001694f84557e3c242c3e3368abbafe2c5b09c214d84ac6e3c950ce5b784f0e6f9f64d5a8305d696b8dead5067a21503d522077a94f8cf0b85200b8730692f76c68ee9d35e05de5dcd49771244264cd0a201cc6e76e30c0974dc0d8fd5", 0xf0, 0x80}, {&(0x7f0000001640)="ed014fa702cddf186c5ff59f6a3cdc77c6297bc0be458406995c365d7092b6941a02e8b890d1bff159db5e0e582a1d0f4ceeb2e6f5b741762a97a280e34cc225ba05c370815b03a60bf53530cff3c65cd023e0e644e951289cd63641d599f67b3478959214942e24af2c2cc459da3f40fc0818d94a13366055d41cf2046c2a7a21809f4b554016aa2f0beebfaefceba9fd503899d04edb9f8366e198d0532b85abea73d6310a8b1524f443316cd4a81e39864f7879bb4884d1b23198d10f99462569949d65774223534c1dd2402493", 0xcf, 0x101}, {&(0x7f0000001740)="ea0517842ff1582b13e2333e522bda5d7abea324a5479ad39079f19319ffd00a8de3edca569c0d0aada0b9b534ae7f44aa2c0ae73b331e74682fa46b0f1ff3b6816fd78b2b8a2c20b394ae64aeaae30581476c8f96ef726b69f446138818170350935b4c66edaf0ff372145a3538b161d5bfc28041c346fbfce3988a5faafeb6de6ac5ac86397b4504f7140cf93562c4e91e79da1f1bf4e650815d1d4b1e954257fa698d800e96", 0xa7, 0x4e}, {&(0x7f0000001800)="a964bb40f98fe0f0581fdbf48743d0a79af1a988203fa83fb34d180dc37a66298267575e92d0f70abd790a1eacbf510d5b6bb605015826ca7471d4a65574fb2d5212900b99ba9e7daa92648c5e93f1b8cbe529bd8c54ca1a287b7070c1a1cec12ca77806c47cc86cfdc5461e3084a84b187bd5381deb9f7e96d33dd4caa3ba7fec529489eca320ba78ea35c59bec32702aa3225842be38f40b200d52bb76c108ba5791df05bf83fb2b39b4b9ecde13137b48d65562f5f451c9373ebe25cd3e63d4f39528bbddd0bc19674f21e90a0bea72fbd75bf0c79234fd4c8a9a573ec36a15d40a30", 0xe4}, {&(0x7f0000001900)="d3527e3cfb20207cea6dd5b00ee8393aedee0a0fee1eb509c1b89d1de204451636fbe63d747b4be59e8dbbb49af51b905d4f8be9db9cd021797be79c796294345cf715a303ffb8a92cf7884b2c83530c1fb2dbe3003a882f10df419822d28c4a1eba8bd450016f059478c434bffe4addb9cc743d20c3baa4d7ba77fec76b611540be9d4151270e3f4959f0027356709b7728bc99cc3f5bac410cc60ad904e54bb69012278b321eeb669985ea46230d889b3cdd1086bc4776", 0xb8, 0x3}, {&(0x7f00000019c0)="5fa89f7b1eab0dd1dcc1d15eeb96dd5e7706e5c73c8ed11f6d7c9dfdc885cabbcb57bdf6d7cc46c1bdebc4c8e77e5cd21d83cf694eb6167de3128f0f3bfb63a1b79aba", 0x43, 0x4}], 0x200010, &(0x7f0000001b80)={[{@acl='acl'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x9}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffff7}}, {@fault_injection={'fault_injection', 0x3d, 0x5}}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@uid_eq={'uid', 0x3d, r6}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x37, 0x0, 0x73, 0x30, 0x3b, 0x38], 0x2d, [0x74, 0x61, 0x35, 0x36], 0x2d, [0x77, 0x33], 0x2d, [0x77, 0x0, 0x7f, 0x33], 0x2d, [0x7f, 0x61, 0x31, 0x66, 0x37, 0x33, 0x37, 0x77]}}}, {@subj_user={'subj_user', 0x3d, 'md5sum@system$.#-*self'}}]}) 03:57:41 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, 0x0) 03:57:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000002}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x11c, r3, 0x600, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x9a0}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb9d}]}, @IPVS_CMD_ATTR_SERVICE={0x70, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x30}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) getsockname$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) sendmsg$kcm(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@ll={0x11, 0x15, r4, 0x1, 0xfffffffffffff001, 0x6, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000640)="281f09c361abd8641f61c85138bb9a68ae8fe0cffc421b89f5a8e2ba996830103041", 0x22}, {&(0x7f0000000680)="68d254f32f7f1d0155541c2ecacb58b68e70a55060bf6392e4254ccb79c78fe8b531c28cd42d814194a2556c09ef3e60da591ed14c4b3f8b6a6e08074300727377096bf264671f3d6df65050ef99800bd11cb880604f6aaf", 0x58}, {&(0x7f0000000700)="bb561d26fd3d9ae5420862c26322177887e915b76dd7dcfc5b97fcc6675fea959f8c544de6a4f111a2fb2a170281114378f64579e6bb93d7efbd552cf987d15313bdfa6a8435", 0x46}, {&(0x7f0000000780)="ff182cb9e7bf676834576f1b5f3d248d2024956f7f20c6c21f639dd25d21f678bdaad9b30faf816a784fde97fb5e36f69400abe60499d28e2369f317547250", 0x3f}], 0x4, &(0x7f0000000800)=[{0x70, 0x118, 0x7, "bd5aee9d6aa9bc822ac76f7e5d118cac99c4b9dafa6ae086cfc6c7c197c5e3891769af485d48854c344e8ed9cae2fcd30176135dc51c50e97091b0fb9e4c7bba4306e2e9b04a911f648e2e3d8ae815ee5358704979f7dc067529422b5577"}, {0xc8, 0x0, 0x7fffffff, "f00d574490c4685db109a04818457ac9d728f48dd971232d22b63c05d784f6f194a301d4cda87079299a8b07d1bd99823083e90ac39d57a13be067d07c7171531fad8f19fb8201abde4b6b27fceb63d284c0ad0f0915d1c4b98336b66bad18e15c5389fd7575ac45c2707df522bb650800724559a28760cd62aa91be948e756dc2d2dfb92a30f308a1703526407b9364a8fcc79348a1719ee44eec66a3add6ea5ad588ff1897441b24608045d63c529b35e657e1"}, {0x48, 0x11, 0x6, "4d15921838d4737b7ad33200ea4258ad47d4c690eb380c41ca57ffb7d5b033e530b73c8bb3d91aa80fdc661b6a014a789cc9dafff6dccc6b"}, {0xc8, 0x115, 0x7, "756ea63a736d7b91cc0a5e4b7ed4f2e55e4d080c3c2210e97bf7cd565a00087bd75eee24f36e556959d95ee542103358c58a93e90f0ac30c084ad3476bd752114803f0388a2c0b3610ceaaa7d3cb389baede4970fd7fb27c8ed3c896cbcc77669b274bca7b042d2f130e5f9fc63e182e113af8d5da73132ce28422becb14f1e823c5f29511d2aeef6e05bf734d8ce9ab90f67f054bd6ffa317ae9b7960f27b6c741b36fc0f858db325a6624c8eeb7fd066bd"}, {0xc0, 0x11a, 0x3, "d1bbfba97745f82c4828b8a6e8e7120024419aa24cc35a12cf9137e0d758592ed85f627a5b7635e2ac7107a9ed4e813b19ffbf6abbd906cd3754b9d5ab06fac7914a7d53ee591851d6ea49dbd0d1e2813c3667d1395004a935baa7a8c7593f1aaddbe2d61e1ee3eaf20a2b1b7750f1eb680fe9c340e910ac5fbb47958ca252bc54b9d074f820b15f61ba1cc063b3598671461c8e02a0aec207594f1a9b282f509feca1b58e441ada3fdc68df"}, {0xb8, 0xbf, 0xb8a, "9dc30f1fa5def9a9a81b83a60b1fadc59dd18b6a5448dba0d56f0590aae62644c9fe5afeb0a30e1f4759014ff5fa07a05cdedf3ff9dce40b199b5e77df2a9803fa9998b1c31134c0b23204cd7513d53d105ccf74ac4300554bfea5c68ef2b9773a765c80c3f72154cc7cb762b33fc75d2153ecbdd7d427f5c2fce7d3c6fa5e6e4c9a246c96ef87be82531d21f198d5ffabe75995fc77a25fad48441f13041485141de6749a"}, {0x28, 0x19f, 0xa3f, "ef18e975e2a1c7ba5e01a7082d761ce8046b4f"}], 0x3e8}, 0x40) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0xffffffffffffff77) read$eventfd(r2, &(0x7f0000000300), 0x3a2) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x10000) 03:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = signalfd4(r1, &(0x7f00000000c0)={0x7}, 0x8, 0x800) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x1}, 0x8) 03:57:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) r3 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='net/mcfilter6\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r3) read$eventfd(r2, 0x0, 0x0) 03:57:41 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0ae8a5fb48bf0000000000000000000000") r1 = accept(r0, &(0x7f0000000000)=@sco, &(0x7f0000000180)=0x80) connect$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0x0, 0x4, 0x81, 0x7, 0x7, 0x4}, 0x3ff}, 0xa) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x204802) r3 = geteuid() r4 = getgid() write$FUSE_ENTRY(r2, &(0x7f00000001c0)={0x90, 0xfffffffffffffffe, 0x6, {0x0, 0x3, 0x9ba8, 0x7fff, 0x2, 0x9, {0x6, 0x2f, 0x6, 0x1, 0xfffffffffffffff7, 0x1ff, 0xfffffffffffffff8, 0x7, 0x6, 0x9, 0x2, r3, r4, 0x9, 0x800}}}, 0x90) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) r6 = socket$netlink(0x10, 0x3, 0xc) writev(r6, &(0x7f0000000080)=[{&(0x7f00000000c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r6, &(0x7f0000000040), 0x1) read$eventfd(r5, 0x0, 0x0) 03:57:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x400001000008912, &(0x7f00000001c0)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x31b) r3 = fcntl$getown(r1, 0x9) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x8000, 0x0) ptrace$setregs(0xf, r3, 0x8, &(0x7f0000000040)="7a98b90d0b99bceef409b4fd0728fd2dcbb9579d5092640a64389a20294af3acce54faad9e62009ef8fa58d5e8ce5f624d373cf00464cd4d3c595b71684accd52379ebc99b5b3ebad8f3aaa86e378ef0e779b8a733") 03:57:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$KDSKBLED(r2, 0x4b65, 0x2) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e23, 0x4, @ipv4={[], [], @remote}, 0x4}, {0xa, 0x4e21, 0x6, @local, 0x800}, 0x6, [0x8, 0x2, 0xffffffffffffffff, 0x1000, 0x8000, 0xfff, 0x200, 0x1]}, 0x5c) read$eventfd(r1, 0x0, 0x0) 03:57:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="facfab46758eaa0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) socket$inet_udp(0x2, 0x2, 0x0) read$eventfd(r1, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 03:57:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendto$inet(r1, &(0x7f0000000040)="01deb741665b6b4e599510bdc07ab60f5c7a716572be8bbf645993d031913f0d2158f69ba564255a52b0b6e7645072168044a5be20a82203a8e20a41e32f792ba66ef12dd5967f8997c1d09b53fcc1a8b98a7b1992ef2f276181782c9ec3e0d4ed0d1591bc9882201a1e7396810fd053fbc71d98aa686811afa31003658634fe809996280af4a430ae36f11e29cc29ef6c56b5a2e24823109344fc864d798dc90db70490c8292f8c98885cb03be0e012fd8722abd56470adb9b5f2731335fb4dae7311b3b97a1d35ad2994c2bd12718a71384e5d3fdc32afbf1b24db9ab3d8554d8fe87873bec7ec4a3e102bf450c9012c5f8351be89", 0xf6, 0x4000040, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, 0x0) 03:57:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='ne\x00/sTat\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:42 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3}) 03:57:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000540)={0x0, @local, @local}, &(0x7f0000000580)=0xc) sendmsg$xdp(r1, &(0x7f00000006c0)={&(0x7f00000005c0)={0x2c, 0x0, r2, 0x1f}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000600)="032b5bf57dc7d2539bedda05df3e9d63002c797ae8591969378dc82f118abe1c4aabd72ac176fefdbe8b2ead0357b39322de2c308aeeba924a09956713324f980cce1e8ae70c17eff1d0700ade4a29b25e9cd3acfe11617b8b893c", 0x5b}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x18) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000240), 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000001c0)=""/101) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r4, 0x8}, &(0x7f0000000100)=0x8) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000280)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000002c0)={0x0, r5}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) socket$inet_udp(0x2, 0x2, 0x0) connect$ax25(r1, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r6, &(0x7f0000000300), 0x3a2) read$eventfd(r6, 0x0, 0x0) 03:57:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$rose(r1, 0x104, 0x1, &(0x7f0000000000)=0x2, 0x4) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12073f3188b0701c28aad2aa98eca7b46f151f0000000000000094674255d3033b6d") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x4) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_aout(r0, &(0x7f0000000340)={{0x107, 0xffff, 0x5, 0x37c, 0x31a, 0xfffffffffffffff8, 0x3c4, 0x4}, "cc9a1a4c84b4d30cfd927753da45ad2cc00d564252346a579e97809edc53e9fd1bf52aaf60fc3712a68d3d8ec82d7ec61168dc71508ca1e449fd308cc8fe7ab898ed482f769c2c4e6d21fe3733b778b4902074a578773f55d31a825260564758d1aca4e0124027045944f5f643f756074c8dbf0d896b26318340a511c09db07d71775d62658bcb222a5ef5f141df12d8ca322546ff4ed12ba32de73437c7378fcb255abdbaf9ec258e1cd24a9f395e86e3f4a5fe33078f5ebccd329ff627b2bb259e51ef36590c0c7765077a82c5219dd2d5add0311005eba3a60010346fb751a8569b23f68f9cffe8", [[], [], [], []]}, 0x509) r1 = dup3(r0, r0, 0xce255e96a2998a93) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="34faa5f0e5bb7572715a929f5bebd1db", 0x10) accept$alg(r2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}, 0x8}, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001f80)={0x7, 0x0, [{0x1000, 0xab, &(0x7f0000000980)=""/171}, {0x1000, 0x1000, &(0x7f0000000b40)=""/4096}, {0x5000, 0xf3, &(0x7f0000001b40)=""/243}, {0x1000, 0xe1, &(0x7f0000001c40)=""/225}, {0x4001, 0x89, &(0x7f0000001d40)=""/137}, {0x7002, 0xc5, &(0x7f0000001e00)=""/197}, {0x0, 0x7c, &(0x7f0000001f00)=""/124}]}) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$input_event(r4, &(0x7f0000000080)={{0x77359400}, 0x15, 0x9, 0xfffffffffffffff7}, 0x18) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/fib_trie\x00') inotify_init1(0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x401, @local, 0x266}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000002100)={r7, 0x4f, "5bbfa3e67044c5d380d41fb99c3151006b84ced71496d39e4b32b47b034b4ba3732c3bbe298df5c6173b095cbbaeac20fac48f03a1b0cd49b506413b16ba730890f3b20fda08075562f76ee7efc8d7"}, &(0x7f00000002c0)=0xffffffffffffff83) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000940)=0x4) getsockname$packet(r4, &(0x7f0000000a80)={0x11, 0x0, 0x0}, &(0x7f0000000ac0)=0x14) recvfrom$packet(r5, &(0x7f0000000900)=""/16, 0x10, 0x100, &(0x7f0000000b00)={0x11, 0xf8, r8, 0x1, 0x2}, 0x14) read$eventfd(r6, &(0x7f0000000300), 0xfffffffffffffe2c) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000100)) read$eventfd(r6, 0x0, 0x0) inotify_init1(0x80000) 03:57:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) getpeername$unix(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) read$eventfd(r2, 0x0, 0x0) 03:57:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000080)=0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f00000000c0), 0x8) read$eventfd(r3, 0x0, 0x0) 03:57:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400100, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000080)={0x4, [0x3f, 0x5, 0x7f, 0x10000]}, 0xc) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0xda) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') socket$nl_route(0x10, 0x3, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:42 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3}) 03:57:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, 0x0) 03:57:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7, 0x10, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x80) name_to_handle_at(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="e7000000050000007719d77cd54f7797d3388b406e524d6c184a6b037f0143e573c9a7e103d788e353550a7833903f2227446d14db8e04d56b4d20921cb217be43d1ee7911b5f409f7fc940e96a0814a4ff29ded7519984ccd3c17140ce19c330ec67431d9080004a6ff46e7c270c852aeab5347ce6c2a9a30588c0579d631b255c206c16e480cc6d45e3434f9a295bebdbb576e28e921e2965601e2c8aaa33002613a61388f01256a1414f0da06ae79d5a3280ef74eae9ca891fe45bde8e95208cd5811849b78c96d2eb361ff3820fd8440c5fbdf9fa8ae4ae626fe743223122bd649bf61b14a"], &(0x7f0000000240), 0x1400) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000040)) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000080)={0x3c, 0xd, 0x12, 0x16, 0x4, 0x3, 0x5, 0xd6, 0xffffffffffffffff}) read$eventfd(r3, &(0x7f00000002c0), 0x551) 03:57:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000040)="7c95f4cddf97a44e905042a2939240786792298b50f30a7e4e8ce520fa86f7b5c70239acb751b687845ea228ddf08fe19b618d94f5ae6764446ea4da46a2274a66ad900cb2bad98ecd53ee38e16fee0d541069c27f53ee675becf5e76b17dd698a0dc91033848f1030234d12b0b9864f597e384395a5eaa9f62386efe79fd8") read$eventfd(r1, 0x0, 0x0) 03:57:43 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x58887f9c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:43 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3}) 03:57:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002e80)=0x214, 0x4) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x4000080) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x84, r3, 0x310, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc5d}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x762}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20008040}, 0x40) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x4000001) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) 03:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)=""/181, &(0x7f0000000140)=0xb5) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x67) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) getgroups(0x8, &(0x7f00000002c0)=[0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0xee01, 0xffffffffffffffff]) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x8, {0x5, 0x0, 0x1ff, 0x5, 0x3, 0x9, {0x5, 0xffff, 0x7, 0x3, 0xa63, 0x7fff, 0x3ff, 0x8001, 0x2, 0x2, 0x10000, r3, r4, 0x7, 0x1ff}}}, 0x90) 03:57:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}}) sync() setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0xffffff83) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7, 0x20, 0x6, 0x7ff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={r1, 0x6, 0x80000001}, &(0x7f00000001c0)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') socket$nl_route(0x10, 0x3, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="000000001cc341d3d88b45c583b39969574d564edbb858a4bc6625efbea9c54cbf9a6c42237d89bc5dcbabb58a5c7ff6262a367a07d23d0e367e51dc0baa524f1f5759e90642e85591f392d3356df9df067db6ff113ecaf1d46fe323678640dbdbfec6b32a499768463defdea74f6783aad07c504c06a9c767ccefaaba1cd1c9279b208689fbe921955cb2cfe84e84e003d4b85d343d90cb840764288532e4f613e1a5db4911b52043", @ANYRES16=r3, @ANYBLOB="0a0326bd7000f4339fc939f7eb221d08000400080000000106040005000000080006000540000008000500ffffffff"], 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x4c010) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = getpid() kcmp(r4, r5, 0xd763e50d1ff0d210, r0, r1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x7) r7 = syz_open_procfs(r6, &(0x7f0000000240)='l\xc3\x02inTid\x00') read$eventfd(r7, &(0x7f0000000300), 0x3a2) 03:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f00000001c0)={0xffff, 0x4, 0x7f, 0x9, 0xffffffff80000000, 0x1}) listen(r1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2000000000000f, &(0x7f0000000040)=0x50b, 0x4) r3 = socket$netlink(0x10, 0x3, 0x40002) writev(r3, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KDGETLED(r4, 0x4b31, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) read$eventfd(r5, 0x0, 0x0) [ 2682.819360][ T3969] Unknown ioctl 21545 [ 2682.835613][ T3975] Unknown ioctl 21545 03:57:44 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x121000, 0x0) connect$l2tp(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x4, 0x1, 0x0, {0xa, 0x4e23, 0x9, @remote, 0xfffffffffffffff7}}}, 0x3a) ioctl$TCFLSH(r2, 0x540b, 0xffffffffffffff81) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000380)='net/ip_vs_stats_percpu\x00') read$eventfd(r2, &(0x7f0000000180), 0xfffffffffffffcf6) read$eventfd(r4, 0x0, 0x0) 03:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 03:57:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0xfffffffffffffffc, 0x0, @remote}}}, 0x108) fallocate(r0, 0x9, 0x8001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x80000001) r3 = shmat(0x0, &(0x7f0000002000/0x3000)=nil, 0x1000) shmdt(r3) read$eventfd(r2, 0x0, 0x0) 03:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8002, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000080)={0x1ff, 0x6, 0x7f3c, 0x7fffffff}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt(r2, 0x4b8, 0x1, &(0x7f00000000c0)="6022e7e1483d968331faa8ba95e1065c11dcabdf748aca757eb0efe678cd139938573a68ffddbc2c8135521fe03edcb17ff9182ba38285ca3c3c14b3acf9a52c2e45d10fd1bba42ad72ad78f369f542aae0e001562e539b7469bdf0ac12d22bc22cf0e6b208eefcda5bf8d6d94b26423208f614ffaee0ce432a5a7bbe746fed687f3a10c94f952a64568af0c0a32f529ce14ea3abde5a1eaea7f28d3d155f0482751d0ed242b98c6e70ea45a8a970223b02921510e31ab7073ce3d3e5588157c8a1a5b783a4218805e8bee1aa80823824b70f86371af90254f0db7a4a3d5de1089486258102650a615832515dde0e8564641c220", 0xf4) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000040)="bbc3ee46283537e34e4cf370baa0b3829c3c1cf4baeabd83f6b6503116d799bd86b0fbb66c14e836177cadfc58927d43c0498a59e5fe2cabfdde63d4a9f030aaefb28b85c8cdf3693d6ea12f92191e061bd7ab9de440bd2ecaed08e372e12d74420cdc72f87d5abb6bf4bb72c1f70ab633418711a64245f2aaf4d6581882f3593637b8760c50c84fec4006fbf4211fad1119d47b8cca3b669a130d3ecedc1d6e04ee98ce362417fe01604eedf0fa3a8c3c95fbcccbf3110de307af0d09483d644c81f26571552e110b7773", 0xcb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) ioctl$TIOCSCTTY(r2, 0x540e, 0x3811) read$eventfd(r2, 0x0, 0x0) 03:57:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) 03:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000080)="aef21d8bcc83ea278fa4301760fb3251a742a4e0c5b4f80ec38c69754ab3730c42f969d90845e3b229955f8e33c4be0d17a3487e637ecff88d0ac9ce36153892c51325ecc5276114473be3f904f165a75ad0c1e8802f7a7615e397b8c5b8c12872fa62192144de5e3cdca091b56fa8fc3480a4b4fcd9659d8096a20e3c5b7dda248da3cf91bf9143cca93bae5a9f2189b123c58e5bf34083f97fd081339641b27fbc9a333796ad2bd6b7f14cf346e191a70963c706b67a9714ae7f03760cbd8f5e44f69b4c708eed888520596c8d679848e36836e1b450683ffef0603db0251d98249c891f1a41c8ccb3d39d413b68e223638a7856dc6a", 0xf7) read$eventfd(r1, 0x0, 0x0) 03:57:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilt\x81r6\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x7fff, 0xfffffffffffff2f7, 0x5}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") connect$netrom(r1, &(0x7f0000000040)={{0x3, @null, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="967347d4", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x10) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r3 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r3) read$eventfd(r2, &(0x7f0000000300), 0x8) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) read$eventfd(r2, 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000180)) 03:57:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x1, "10640400"}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x8) read$eventfd(r2, 0x0, 0x0) 03:57:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x80000001, 0x20800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)={0xfc, r3, 0xb12, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x883a}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}]}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x4}]}, 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x1) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r5, 0x30, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}}, 0xa0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0x5) read$eventfd(r4, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x8001, 0x0) 03:57:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x12000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="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") r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x101, 0x484ac0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x8, 0x202, 0x200, 0xb8, 0x0}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r4, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x1) read$eventfd(r5, &(0x7f0000000300), 0x340) 03:57:45 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) write$vnet(r3, &(0x7f0000000240)={0x1, {&(0x7f0000000100)=""/131, 0x83, &(0x7f00000001c0)=""/84, 0x3, 0x3}}, 0x68) 03:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x80, 0x7fffffff, 0x1c52, 0x7}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes256, 0x0, "e5ff9dcc277de823"}) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000040)) read$eventfd(r2, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x8c, r3, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x380000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000280)=0x810d) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, [], [{0x4e28, 0x6, 0x8, 0x9, 0xfffffffffffffff8, 0x9f4}, {0x4, 0xff, 0xcb0, 0x0, 0x7, 0x537}], [[], [], [], []]}) 03:57:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 03:57:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) write$vnet(r3, &(0x7f0000000240)={0x1, {&(0x7f0000000100)=""/131, 0x83, &(0x7f00000001c0)=""/84, 0x3, 0x3}}, 0x68) 03:57:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = shmget(0x1, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) r3 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="b718f8fde9174338a2dc94ddbebcb3df65ec09cfcfa425f9d25dedca7b1e9f0d90d986", 0x23, 0xfffffffffffffffe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/8, 0x8) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0xf903951f71d1fb5) 03:57:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) accept$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000100)=0x60) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) 03:57:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x12000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0xf33}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r3, 0x100000001}, 0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) rt_sigpending(&(0x7f0000000040), 0x8) 03:57:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) write$vnet(r3, &(0x7f0000000240)={0x1, {&(0x7f0000000100)=""/131, 0x83, &(0x7f00000001c0)=""/84, 0x3, 0x3}}, 0x68) 03:57:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000040)=0xa5) 03:57:46 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x28040) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x4, "5daace9b"}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x1, 0x1, [0x8]}, 0xa) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) connect(r1, &(0x7f0000000080)=@ipx={0x4, 0x7e9, 0x7, "ae68376ab806", 0x3}, 0x80) 03:57:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f00000000c0), 0xfffffffa) read$eventfd(r2, 0x0, 0x0) 03:57:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8f4, 0x5, 0x7f, 0xffff, 0x4}, &(0x7f0000000100)=0x14) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x64, r5, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffff}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x400000000000000}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x0) mount$9p_virtio(&(0x7f0000000180)='eth1}.\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x400, &(0x7f00000003c0)={'trans=virtio,', {[{@cachetag={'cachetag', 0x3d, '/bdev}vboxnet0'}}, {@afid={'afid', 0x3d, 0x9}}, {@version_u='version=9p2000.u'}, {@uname={'uname', 0x3d, 'mime_type*cgroup'}}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@cache_fscache='cache=fscache'}, {@access_client='access=client'}, {@version_L='version=9p2000.L'}], [{@subj_type={'subj_type', 0x3d, 'cgroup-'}}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}, {@pcr={'pcr', 0x3d, 0x20}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9, 0x10}, 0xc) read$eventfd(r1, &(0x7f00000001c0), 0xfffffdf9) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0xff5d) read$eventfd(r1, 0x0, 0x0) 03:57:47 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="e873b4798455ce", @ANYRES16, @ANYBLOB="00022bbd7000ffdbdf25050000001400060008000100ff0100000040000500080001006962000008000100657468000800010065746800240002000800030000100000080002000300000008000100160000000800000003000000740004000c00010073797a300000000024000700080002000100000008000200070000000800040006000000080001000b0000002c000700080001000a000000080001001c0000cd64083f822e0f000800020001040000080001000862726f6164636173742d6c0004002400070008000400050000000800020000000000080001001600000008000300f33000000c000700080004000900000034000700080002000200000008000400ff7f00000800010010000000080004009e000000080001000c00000008000400150c00001400010062726f6164636173742d6c696e6b00e32400020008000100ff010000080002000000000008000100050000000800020075f5000043bb51181c027da7582744001c00090008000200010000000800010001000000080002002000000000"], 0x198}, 0x1, 0x0, 0x0, 0x40001}, 0x8000) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000680), 0x8) read$eventfd(r2, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000640)={0x2, 0x0, &(0x7f0000000340)=""/129, &(0x7f0000000540)=""/24, &(0x7f0000000580)=""/157, 0x2000}) 03:57:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f00000000c0)=0x13b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:47 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:47 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) 03:57:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r1 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x3000) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x100, 0x2, {0x3, 0x8, 0x3, 0xde70}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000100), 0xa756) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000227bd7000fddbdf25020000000800040001680000080004000104000004000500"], 0x28}, 0x1, 0x0, 0x0, 0x40440c1}, 0xe2a75dc8c515b995) read$eventfd(r2, 0x0, 0x0) 03:57:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r1 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x3000) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x100000001, {{0xa, 0x4e20, 0x1, @remote, 0x4}}}, 0x88) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) dup2(r1, r2) read$eventfd(r2, 0x0, 0x0) 03:57:47 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x1be62701, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000040)={0xf000000, 0x0, 0x0, [], 0x0}) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r1 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x3000) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:47 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') 03:57:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)='net/mcfilter6\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='-/\x00', &(0x7f0000000140)='vboxnet1vmnet0\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='net/mcfilter6\x00'], &(0x7f0000000580)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='net/mcfilter6\x00', &(0x7f00000002c0)='net/mcfilter6\x00', &(0x7f0000000340)='net/mcfilter6\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='net/mcfilter6\x00', &(0x7f0000000540)='net/mcfilter6\x00']) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/dev_mcast\x00') ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000140)={0x54, &(0x7f00000000c0)="3ad01f48e1ec29d0134eba06a4af7ec5b608a9f37e337a38eb60b4a2ce02373253d17ee8747a541bae289067595a7ee9471526038c33cbaab93ebc97d2483cffacd2826febd6b3b43a34c2b41bbbc426271b5cd0"}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r4, 0x800, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$CAPI_GET_PROFILE(r2, 0xc0404309, &(0x7f0000000040)=0x80000000) 03:57:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4400, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000080)=0x800, 0x4) read$eventfd(r2, 0x0, 0x0) 03:57:48 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') 03:57:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, r0, 0x0, 0x78) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) bind$isdn_base(r2, &(0x7f0000000040)={0x22, 0x3, 0x8000, 0xffffffffffff1ca5, 0x7}, 0x6) 03:57:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x220800, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3ff) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', r3}) 03:57:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x7, @local}}}, 0x2f1) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0xfffffda4) read$eventfd(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000000c0)={r3, 0x5}, 0x8) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, 0x10, r2, 0x0) 03:57:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x67, 0x100) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4019000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0f400000ce90761e9bc63bc92ebe5803b398704e05f127fd496dd8729c6905db667d366b99a68d7cf7e40ac6e106c9e224e82e11920a85d481610b2a1e8d8e2ea172868c61a7ac6207831433b774f317cfac32d95e1c45cd0c08fa49593f25cc5880afc126c69764", @ANYRES16=r2, @ANYBLOB="007f26bd0200b736181a93fd0d34e2000500"], 0x18}, 0x1, 0x0, 0x0, 0x50}, 0x20000000) read$eventfd(r1, 0x0, 0x0) 03:57:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40201, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000080)={0x7, 0x200, 0x1000, &(0x7f0000000540)="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"}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x842) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000080)=0x94fc) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:49 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') 03:57:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="43271fb42c8b9db3ad0adc") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e22, @loopback}, 0x100, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)='team0\x00', 0x9, 0x100000001, 0x5}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000140), 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x101, 0x4, 0x1}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x5}, 0x8) read$eventfd(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x24) 03:57:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000040)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xed, "55ecededd15c7462bf484d9c9410cfab3e84b13a13b0d2e41665a36b1996bb6c69f9d3127931be89c369f56c065800d0817dcccddc1d356c0ea6446c7a7fdd040982741b31f7396e5bdd8214799d12ea0c67cc66d2fc6d9814b648e961a9b8f47303b7f0e7b8903d7ad7c8d9e8a57513a3896d833f2305ef12290d6144d6061ac37594b5e10be6118804d9b771ada849b790e1117196f598546c74fcb622129258c7ad2e777394f05c140b695342a1f237650556e8472483e4c1f06659a0a4dc911ea72f1618521505937d935da1c82e309a208d8088af1fd24c37c6033a25c0ecd96faf8a17a9bd4832e45472"}, &(0x7f0000000180)=0xf5) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x4}, 0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@loopback, 0x9c3, 0x1, 0x3, 0x1, 0x7, 0x5}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0xfff, 0x0, 0x10003, 0x600}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000000c0)={0xfff, r2}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f4b0f123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') fcntl$getown(r1, 0x9) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:49 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$input_event(r1, &(0x7f0000000080)={{}, 0x14, 0x1, 0x2}, 0x18) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) read$eventfd(r3, 0x0, 0x0) 03:57:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:57:50 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') 03:57:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) read$eventfd(r0, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000), 0x0, 0x4000080, &(0x7f0000000040)={0x1a, 0x31a, 0x20, 0xffffffffffffff09, 0x6, 0x3b, @remote}, 0x10) 03:57:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000080), 0x8) read$eventfd(r2, 0x0, 0x0) 03:57:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3d9, 0x488000) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000040)=0x2) read$eventfd(r2, 0x0, 0x0) 03:57:50 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) r3 = gettid() setpgid(r2, r3) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:50 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000040)={0xe37d}, 0x8) 03:57:50 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:57:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0x6e, 0x3, 0x100a, 0x7, 0x0, 0x1, 0x1, 0x6}}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r2, 0x3, 0x1, 0x7, &(0x7f0000000000)=[0x0], 0x1}, 0x20) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x4000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r2, &(0x7f00000000c0)='net/sockstat6\x00') read$eventfd(r1, 0x0, 0x0) 03:57:51 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x8fdf, 0x0, 0x1, 0x200}, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200202, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000000c0)=""/123) bind$alg(r2, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia)\x00'}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 03:57:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) eventfd(0x1) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f00000000c0), 0x8) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x201) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000080)=@default) 03:57:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x581400) read$eventfd(r1, 0x0, 0x0) 03:57:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x2eb03ddf}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x400, 0x6, 0x8008, 0x5, 0x100000000, 0x1, 0xfffffffffffffffc, 0xffff, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000001c0)={r3, 0xcf5, 0x400, 0x3b, 0x4, 0x1, 0x4, 0x0, {r4, @in6={{0xa, 0x4e21, 0x9, @local, 0xffff}}, 0x7ff800000, 0x0, 0x8, 0x5, 0xffffffffc963d918}}, &(0x7f0000000280)=0xb0) read$eventfd(r2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) 03:57:51 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, 0x0, &(0x7f000095c000)) 03:57:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$eventfd(r0, &(0x7f0000000300), 0x3a2) write$binfmt_aout(r1, &(0x7f0000000340)={{0x107, 0x75, 0x7, 0x4a, 0x9d, 0x1000, 0x398, 0x80000000}, "e7ea4b8dbb5051aabeb5ffa01e5db79752b0b6e626132353d98cc2af91d5e1a2ad444ca8fcb593838a03a8701b2c3994f540b61c7600be", [[], [], [], [], [], [], []]}, 0x757) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x88e, 0x4, 0x2, 0x5, 0x0, 0xea, 0x9, 0x3, 0xe77a, 0x7ff, 0x20}, 0xb) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) read$eventfd(r0, 0x0, 0xfffffffffffffc2c) 03:57:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x4800, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:57:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) read$eventfd(r3, &(0x7f0000000300), 0x3a2) setsockopt$inet6_udp_int(r3, 0x11, 0x25b6387bb2e6d16a, &(0x7f0000000040)=0x8000, 0x4) read$eventfd(r3, 0x0, 0xffffffffffffffce) 03:57:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) setpriority(0x3, r2, 0x3) 03:57:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000040), 0x60) 03:57:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) r3 = syz_open_procfs(r2, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000040), 0x8) read$eventfd(r1, 0x0, 0x3e29e2658b6c0d9e) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) 03:57:52 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, 0x0, &(0x7f000095c000)) 03:57:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_int(r0, 0x29, 0x4f, &(0x7f0000000040)=0x7, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0xbc) read$eventfd(r2, 0x0, 0x0) 03:57:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setitimer(0x1, &(0x7f0000000040)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000080)) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40803, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000080)={0x43, 0x9, 0x2, {0x1, 0x3, 0x81, 0x3, 0x9e, 0x3, 0x7, 0x80000001, 0x7ff}}, 0x43) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:53 executing program 2: r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x7, @ipv4, 0x7}}, 0x4, 0x800}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r1, 0x0, 0x7}, 0x8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) write$FUSE_DIRENT(r1, &(0x7f0000000040)={0x30, 0xffffffffffffffda, 0x6, [{0x1, 0x1, 0x6, 0x1, 'vmnet0'}]}, 0x30) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000080)) read$eventfd(r0, 0x0, 0xffffffffffffffb6) 03:57:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1f}}}}, 0xffffffffffffffb0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x8002, 0x0) bind$alg(r2, &(0x7f0000000a00)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x2d8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000580)={@isdn={0x22, 0x8001, 0x5, 0xffffffffffffffff, 0x10000}, {&(0x7f00000001c0)=""/23, 0x17}, &(0x7f0000000280), 0x40}, 0xa0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r1, 0x9, 0xfffffffffffffff8, 0xffffffff, 0x7}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000800)={0x0, @in={{0x2, 0x4e24, @local}}, 0x2, 0x4, 0x101, 0xffffffffffffffff, 0xfffffffffffffc0e}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000006ac0), &(0x7f0000006b00)=0x8) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000000)=0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000480)=ANY=[], 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)=0x3) epoll_wait(r2, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0xd9d3ba35b0d75ba9, 0xd66) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) accept(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 03:57:53 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, 0x0, &(0x7f000095c000)) 03:57:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x103, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f00000000c0)={0x0, r3, 0x1}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") prctl$PR_SET_THP_DISABLE(0x29, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x10040, 0x0) read$eventfd(r2, &(0x7f00000000c0), 0x8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20000, 0x0) 03:57:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x802, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) sendmsg$rds(r1, &(0x7f0000001740)={&(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000100)=""/227, 0xe3}, {&(0x7f0000000200)=""/54, 0x36}, {&(0x7f0000000240)=""/1, 0x1}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000340)=""/82, 0x52}], 0x6, &(0x7f0000001680)=[@cswp={0x58, 0x114, 0x7, {{0x3, 0x4}, &(0x7f00000003c0)=0x40, &(0x7f00000015c0)=0x9, 0x0, 0x7, 0x3, 0x2, 0x40, 0xffffffffffff0001}}, @cswp={0x58, 0x114, 0x7, {{0x8, 0x1000}, &(0x7f0000001600)=0x800, &(0x7f0000001640)=0x8, 0x5, 0x39, 0x4, 0x0, 0x7b, 0x1}}], 0xb0, 0x80}, 0x20000000) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r2}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) r3 = semget$private(0x0, 0x2, 0x2) fcntl$getownex(r2, 0x10, &(0x7f0000000540)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x6, 0x80000000aaf) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000340)={{0xffffffff, r5, r6, r7, 0x0, 0x2, 0xbbb}, 0x1000, 0x206, 0x7}) 03:57:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x200) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x1108}], 0x1, 0x100000000) 03:57:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x100) read$eventfd(r1, &(0x7f0000000300), 0x3a2) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f0000000300000000000000000000000200000000c1a9eb0c895ecd485a235b5e6c0000000e000000000000006e658b2f6d6366696c746572360000"], 0x2f) read$eventfd(r2, 0x0, 0x0) 03:57:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:54 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000080)={0x1, 0x100}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0xfffffffffffffea9) 03:57:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6, @in6=@empty}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000200)=0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2, 0x2}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1e}}}}, 0xffffff4d) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000080), 0x1) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000000)="0ad89ae843d83bef49b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xffff, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x84}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x1cc, r2, 0x310, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10000, @empty, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @mcast1, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x73f2cca3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9b7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x122b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffc0000000000000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x7}}}}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbed}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0xc000}, 0x20000044) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) 03:57:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@int=0x3, 0x4) 03:57:55 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000080), 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f00000001c0)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, 0x4, [@null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) pread64(r3, &(0x7f0000000080)=""/169, 0xa9, 0x0) 03:57:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x0, 0xea}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x7, r2, 0x10000, 0xfffffffffffffffe}) read$eventfd(r1, 0x0, 0x0) 03:57:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f0000000040)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000100)=""/79) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:56 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0xc2d, 0x30, 0x1, 0xfffffffffffffffd}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x100}, &(0x7f00000001c0)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) openat$cgroup_ro(r3, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) read$eventfd(r3, 0x0, 0x0) 03:57:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:56 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, 0x5}, 0x10) read$eventfd(r2, &(0x7f0000000300), 0x3a2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r2, &(0x7f00000000c0)=[{{0x77359400}, 0x1f, 0xbc2, 0x8001}, {{0x0, 0x7530}, 0x17, 0x8, 0x3f}, {{r3, r4/1000+10000}, 0x0, 0x3, 0x4284}, {{0x0, 0x7530}, 0x15, 0x5, 0xfffffffffffffff7}, {{0x77359400}, 0x1f, 0x5, 0x8}], 0x78) bind$isdn(r2, &(0x7f0000000140)={0x22, 0x5, 0xc16, 0x1, 0x2}, 0x6) 03:57:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140), &(0x7f000095c000)=0x20000148) 03:57:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40000, 0x0) connect$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710, @reserved}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0xe9c0bf14) 03:57:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:56 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x7f, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x25}}}}, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) 03:57:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008952, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") futex(&(0x7f00000000c0)=0x2, 0x8f, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x1) r2 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x101000) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) utimensat(r2, &(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={{r3, r4/1000+30000}, {r5, r6/1000+30000}}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x1, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r7 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r7, &(0x7f0000000300), 0x3a2) read$eventfd(r7, 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000240)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r8}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x2) 03:57:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f00000001c0)="9157ec6ae99431a4ca7009084cdf7a8d7290f1d01cf8798ca07c815ab71c50a11d47ba059a316cd171a1e93c97ab5f492a4fef318fb1e3d5e7faae242a534197768b59feab94d2a8f5cfe2644d531979468ac6a34ab330ff9e3611a7aa1d0ee895e136b5", 0x64) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000240)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'eql\x00', 0x0}) r4 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@local, @in=@rand_addr=0x2, 0x4e20, 0x9, 0x4e24, 0x6, 0x2, 0x80, 0x80, 0x73, r3, r4}, {0x6, 0x80, 0x7fff, 0x5f4, 0x3, 0x2, 0x2, 0x6481}, {0x100000000, 0x8, 0x5, 0x1}, 0x1f, 0x6e6bb2, 0x1, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in=@empty, 0x0, 0x1, 0x3, 0x100, 0x10000, 0xffffffff, 0xffff}}, 0xe8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000280)=0x7) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') dup2(r5, r5) read$eventfd(r5, &(0x7f0000000300), 0x3a2) 03:57:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000140)=0x2) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000040)={0xe, @capture={0x1000, 0x1, {0x7, 0x5}, 0x3, 0xdeb5}}) 03:57:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, 0x0) 03:57:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r2, 0x78, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, @in6={0xa, 0x4e20, 0x9, @empty, 0xfffffffffffffffb}, @in6={0xa, 0x4e22, 0x7, @loopback, 0x6}, @in={0x2, 0x4e24, @rand_addr=0x9}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000000180)=0x10) read$eventfd(r1, 0x0, 0x0) 03:57:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0x5, {{0xa, 0x4e23, 0x200, @empty, 0x7}}, {{0xa, 0x4e20, 0x100000000, @mcast1, 0x8}}}, 0x108) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2804001}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x810) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x240}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x5c, r4, 0x28, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x24}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) read$eventfd(r5, 0x0, 0x0) 03:57:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x111002, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:57 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'bcsf0\x00', 0x200}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f00000000c0), 0x14f) read$eventfd(r2, 0x0, 0x0) 03:57:57 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x200000) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='cmdline\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f00000001c0)={0x5}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000180)) read$eventfd(r4, 0x0, 0x0) 03:57:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x6, 0x8, &(0x7f0000000080)=0x9}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000180)) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0)=0x376ea548, 0x4) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0ad91f123c123f3188b870") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, 0x0, 0xfffffffffffffffd) 03:57:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, 0x0) 03:57:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x10000000000001, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x3, @local}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000040)=""/240) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x7ff, 0xff32, 0x100}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r3, 0x1}, 0x8) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000280)=""/69, &(0x7f0000000340)=0x45) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) fcntl$lock(r2, 0x27, &(0x7f0000000180)={0x0, 0x2, 0x6, 0x7, r4}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:57:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_sctp(0x2, 0x1, 0x84) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) 03:57:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0x2, 0x4) read$eventfd(r1, 0x0, 0x0) 03:57:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:58 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000040)={0x20, 0x0, 0x1010, 0x800, 0x1ff, 0x2, 0x4, 0x1}) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0xfffffda8) read$eventfd(r2, 0x0, 0x0) 03:57:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000040)) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x240000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000140)={0xd4, 0x8, 0x7, "2c342c6f0173002b86933160509383890a0a4fdfec903b9f07a5da758394ea062b49e476bcb6e379b5a90d343e7428d435fbbfcdd82ae4a44344d9ccd1b8ce2beb2aa87f7c72d1243d48ffb16314feae8545b32610f0cb8e7dc3171f0f96953bdbd07528d4c39279ff467194f88602d09a099422d178b1636a0f1382ad584cf39ee158da262a9b799308edde5e769d88a90446ef4da52c54681d528bbef3720c2d3dd947a0a474f41e43db03f4485859b2d906e992b454749038c69e5d1aa7deed266cd5b22afb9930e0bfd747bc98705ba428f7"}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) unlink(&(0x7f0000000240)='./file0\x00') openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000080)={{0x2, 0x3, 0x3, 0x2, 0x8}}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfffffffffffffef9) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) 03:57:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008916, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000100)={0x1, {{0xa, 0x0, 0xfffffffffffffffd, @mcast2}}, {{0xa, 0x4e24, 0x0, @remote}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000340)={{0x2, 0x4e22, @rand_addr=0x8cc6}, {0x307}, 0x28, {0x2, 0x4e21, @multicast2}, 'rose0\x00'}) read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) fcntl$setown(r1, 0x8, r3) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000240)='em0(-\x00') write$ppp(r2, &(0x7f0000000040)="97db01606ad8818f9016ea852b3914673b7ed3a0f113d51f887219a95398ef0e733cac8dff43ce050f160460467fb64ad4fe412bbd80f2287e2aa5d109ff57449128f1d7752c86715693513e09cf9312f0381aa7e2f3dc42fd19f7af2301670256a411e9729366c18a8879b964ac684df426ff6940586183af1ce98c424c4a485c3dbb002f25088f50deb01d183f490752cbd6653438e32776ec0f3085c6d299ee53b97b53", 0xa5) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000000280)={0x1d, r4}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000400)={0x0, 0xa04}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000480)={r5, 0xf53f, 0x9, 0x100000001}, 0x10) 03:57:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, 0x0) read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:57:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, 0x0) 03:57:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="335d0f1c7c407ef685dc7a410d3ec7bfb22fce1013f292274ab8a8a697caa1e4d6c30a52c0143ad837d44b46dc6c029d285588eb63650298d1e07ce950867607fabf933e") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x20, 0x200) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x5d, 0x71, "dd1ad3e36c5dd95cc12f1ae6eb7971c04665e5696a87bee5f5538352b0b5a006c6dfdfb808b0007ebc0069a5594b877b309df0884e3c729e0890117dd0bb0474727088acf5eae239e3a1042f4336dec7f3762c7dff"}, &(0x7f0000000200), 0x0) 03:57:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x52) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) 03:57:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000200)=0x4004, 0x4) prctl$PR_SET_UNALIGN(0x6, 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000340)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x4e24, 0x0, @remote}}}, 0x108) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000280)=0x3ff) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240)="556b1b747c59", 0x6, 0x20004004, &(0x7f00000002c0)={0xa, 0x4e23, 0xb149, @rand_addr="1cdf17dfa0ebeaf9785c9ae00c554719", 0xc617}, 0x1c) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="700000003e4faf393e2ef9c760a2e2a7ac8635abd47220a311d036e94a6eebc54042ab72c7c6f0c2814b2ce93aaf3d161ea8dd7d98a31f50140101000074f4cae071b0f65f3356c39c947b94dbd6fdc2eb80fce6d01bc3d691d97f3e451f78650eac903a3bb852e573db742b5d70d349df64bca6"], &(0x7f00000000c0)=0x78) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x5}, &(0x7f0000000140)=0x8) ioctl$BLKRRPART(r3, 0x125f, 0x0) 03:57:59 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:57:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:57:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x800) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', 'net/mcfilter6\x00'}, 0x13) 03:57:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4c0a200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getrule={0x20, 0x22, 0x3, 0x70bd25, 0x4, {0xa, 0x14, 0x34, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x5, 0x4}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 03:57:59 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:57:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:57:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) 03:58:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@rand_addr="feb21fbabea69afa3aa00cbfdd2ac816", @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @rand_addr="3693b5c3be1516e7383710d86808f5cd", 0xffffffffffffffff, 0x6, 0x8, 0x400, 0x7, 0x4040100, r2}) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000140)={0x9, [0x800, 0x8, 0x6, 0x101, 0xd9e, 0x0, 0x8, 0x7, 0x80000000]}, &(0x7f0000000180)=0x16) read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:58:00 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:00 executing program 2: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x3, 0xd}) read$eventfd(r2, &(0x7f0000000300), 0x73e) 03:58:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x0) 03:58:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x32) 03:58:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x31a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x2e5) shutdown(r0, 0x1) 03:58:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x88, 0x0) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:58:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0x8dcdbde73f1fed1, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:58:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:58:00 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x3, 0x80}, {}, 0x200, 0x0, 0x209f}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="6135c1f23e58cb3e4d0f5c9c9774bfad1e322f48b5345090e7bb8057c93187d591cd280cafbc09836ba6985c86442ac920ae5e89a09a31666059fa9e83c7c56e16346317412ed956cb73f6399d9b5964cce11a7c6be418677c7650670a19fcc21ecc56fa1ee9c9d34a6a1f1ed32af525bbb186468c8b998e0fc603b74f741164d8a3945fe11b82413af628fe7638c2c532b65404d8e4684c3aae58854fac14aa9ae51ff72b3dab86c7015260937470567c38874fa49b763f1401d73ebb8a40db3f2b751a80698abb0144804aef5067d16eba26104edbe76ca520f2", 0xdb, 0xfffffffffffffffc) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000340)="6f652c58d62dbd7a31927d3d74fb9d7f9a40e62a0b0f6b3809307fb38b8eff53f8f1a5031997b649ab8b5387e79371e2bb9c1921cf579d3d1fb3f6ea535238461ad75c08d423cc42fa7fa3ff014905a2116312eef4329fc4885aa8498001bf0156e9a519cdf8a35e284d9f125a5b2019fa9f3c59edaaf2340f04a71fd160abd727a36749cfd83673c7e3a72ed77df72feb2540a19c00b74cd2ff7378318b76346964e72b544900e7e16221f3", 0xac, 0xfffffffffffffff8) r4 = add_key(&(0x7f0000000400)='big_key\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)="b4a4bb17b5dafba0af1b0f74f73d42cc58125aac7bbe2d6b8eec6b92003837194afea5c5c5885a66bf51ff225efb6a1671f17f8d25581e51ffcca9da1559c6ffd92103006286296d88b84f2c28174f204162645488a472e0e10dea5459790ee162c8828f0a9d727f03deddbf5332f6f3c2a72a291ccd6fe13c18d0021b191bff5c2ebd798395514a8012ba64392fddc0996dd055684037e27fb9fd19c106a3384a74ae6f2a5e2bbc51a9beed902b5319dcb71f660c0c516f9d755cfcaff2cfdfc619d16ba1a2df42c5f6c027779a9132adb9718f567e953ff7328a3f8a5dc122f80cd39f2a3c9be8b333586d17", 0xed, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r3, r4}, &(0x7f00000005c0)=""/4096, 0x1000, &(0x7f00000016c0)={&(0x7f00000015c0)={'tgr160\x00'}, &(0x7f0000001600)="745958c1a549537a84a4bb917b8e2b07aef4b0d3711212d4c4c573fa862f92ca6738f213c3e1f20749c7fa9db36f4a50ac487e22a23925a6a3dda7f9472721d4332cdba3a7d491fe3d869e397a01606506dba9740622f88ec3d5f44fb9a18cbb8cc076be9beca32c40e91ff50fc19214034fbca1f3f8a98b07fd3a05225d0943835dc43062513a6ba9574ee238c22d9c0e9c481a8a0050ffffaa78", 0x9b}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') socket$inet_udplite(0x2, 0x2, 0x88) read$eventfd(r5, &(0x7f0000000300), 0x3a2) read$eventfd(r5, 0x0, 0x0) 03:58:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8e, 0x2001) r3 = open(&(0x7f0000000140)='./bus\x00', 0x109000, 0x8000000000c4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(r2, 0x0) ftruncate(r3, 0x2008000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000000), 0x0) sendfile(r1, r3, 0x0, 0x80000000000d) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) read$eventfd(r4, 0x0, 0x0) fsetxattr(r3, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='vmnet0md5sum\x00', 0xd, 0x3) 03:58:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="07010b00000003230074c4ac6bc24401a396b3ee055b7b26cf43826cdbaef50b25e1330c05661ce6292d53b37ba5c73bc3d842d62ff6e84f0a811669083be1f084d9269bca12b8d4ecefd28c55004615053b81ef686cd57ee0c650dec3979ced3fb513cc4ec02c1021e2c4355a8a95749f981efd33725429236e7583a9f0"], 0x7e, 0x0) read$eventfd(r2, &(0x7f0000000300), 0x3a2) 03:58:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x88, 0x0) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:58:01 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:01 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000240)='./file0\x00') 03:58:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000080)={r2, r3+10000000}, &(0x7f00000000c0)) setitimer(0x0, &(0x7f0000000200)={{0x77359400}}, &(0x7f0000000240)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') read$eventfd(r4, &(0x7f0000000300), 0x3a2) getpeername(r1, &(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f00000001c0)=0x80) accept$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, &(0x7f00000002c0)=0x1c) 03:58:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x88, 0x0) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:58:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) socket$inet_udplite(0x2, 0x2, 0x88) read$eventfd(r1, 0x0, 0x11) sendmmsg$alg(r1, &(0x7f0000005280)=[{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000040)="21525640cf9065e06b3507e898f59aa27a18401e1fa1e7bddd5727c05ed713b5f2a6ee27657cdb5fa62a60b30371849c65e2e307b67fe75149a75df58d612b4db198a2298dbf6287ec1677b5269bef8ecca12a13b9afda4218e6a877d4cbb75b7b908ce57a9060ba5c188e8a554fc3f7b430d0d1951d9201fdadff", 0x7b}, {&(0x7f00000000c0)="5e83e0f51dd74bce6fd810de5145e610f11f6406eeec902987dcfe01ae26c252b18624ffa2b83a5d3e84c0d371399e9f6df72b844af866b3d98fa92589510ac37b5219d07eaeef4b7bc3081422352162cecf9a0162186a672197c07db32a93100c2b668473fc086e", 0x68}, {&(0x7f0000000140)="116ec65481006faa018236f5aa5c3bf255e2c989c882b4475c8f67e9a2c0de77495c84c19fa2a927e63dcafc779d8c14e4162d291c29461db754436c1b74080d5ecd2875b9b3f21960a8e33002ca09e6389c936cc0b79c5e7111fcd25fe90fb90035369ed0cf1280e034c92154bf38e7206f12d061978faaf10aecda811016db10be90c89f96695a8f809e639960463f8c202cc07a79896db70c60ee22c12d8ae632b6e3f66b924c9429", 0xaa}, {&(0x7f0000000200)="76e42b16ace1ca4777970a413302fcfa203b72e23feb34c8e7e0d228fc1ccbf2151b80e3b0072f7ddf5f5e757ac3c57a7040d797e75b3fd4639138555a74c9d2bf25ba2fa1f4997e6c85f2cb65ae21291f8f2eef55ffdda033ec3a3d1d037a3afee005073cecf396914490ad380a9550727d17e64bb7b3ed71fc941e3d912ea8d74926634512532fac8da053fd55c78e63f08d5d0d524e1530f9e64c6fbd7ce5a005f0d36b14b4e30b3435aff18a8ab05d1d8912e2516092f9706c455b9ddef9f0f3cf31402dc2394cf065d621035a87352b6dee0808086b0311a7eb10", 0xdd}], 0x5, &(0x7f00000013c0)=[@op={0x18}], 0x18, 0x20000810}, {0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000001400)="709f3f249e44", 0x6}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="2833d53f03431acb3a3e5910d961413e185c256d7816730020eefc5a7264d79992d7e18512e9971343cce77abeae7d798ac0e156bd741969c649ddd5fc5b59d80aaf5bb9adf9aed81b1ce9ef9eb92ca61a81c66e4ae5abf5a462d00f14f9b19effa20e53b0eb1dd8eaeb1c29d6f51814f569d6e714a9b1adf18f62504e14aad01d3b645cbe7cc081bf0c53c7a42a4f7c8032e889e569d9d3e555931bc35cf8d243482b", 0xa3}, {&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000003500)="24b927df4d18aaaf9d393ebc2e419634ff83bfe51a6ebf85afe39281da2052fbfaa7df0510ef4e3b809090bf8322f2cf948acc7293405e77246e053445b5f62a9b10a77df539b7db079ab1fe229f6813a273b20ed2dadb56744687d12928f921c17cef4ba0f670a97d088e174213718396040772baa3b38a949fb3d4f224707c2475da050ebc3512a00458bdae3099f7f229a56bba42004524fa6cf46013643eb5b2400c5935b3eae309", 0xaa}, {&(0x7f00000035c0)="99867cab44a7659b7ece23fc98f059234c01bb524b93d7cb43bdab3f440a3cd0c7d46fcde1069f8c06a8b55b89", 0x2d}, {&(0x7f0000003600)="e97f03a694100d36bd8df8e7816519598d", 0x11}, {&(0x7f0000003640)="e2ca29fabb89a297f04640d6b30de739885c6c15df5fe7b475ed5988a0da541c6d403b16df6b135e4304ac2b94a18d535deb3575377b64ddc933e5b8bce115eb578e8c5c18", 0x45}], 0x8, &(0x7f0000003740), 0x0, 0x4000080}, {0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003780)="323b07926681e0f576580ec94f36bdbc2c68c3283fe5d19036a92c57425fd25eb1f1", 0x22}, {&(0x7f00000037c0)="4bfbf0dfa2b9afcec72ce2bf0ff4e2376f3cdd5790f256680cede88745fd7c6c9fcfee", 0x23}, {&(0x7f0000003800)="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", 0x1000}, {&(0x7f0000004800)="9179a563e2ec4752163edfa8364ffade6fbcdb3ffa6780bcf8718f364c74ec7165c6fc06fc132a183c189001ead297a94e2b33269f10aa44899d626d7bc726eacab96d21bb455d5bea9262d80876a2ddb8b8203c7b4178a5eba67a24b541a635640b9bb75f38dadfc3f917b5a4881753610e0d8c3b231ca0a426eaa4872a95929bd76cf8234553", 0x87}, {&(0x7f00000048c0)="37989d2ab4f1d0bc300c0ee6f3fedac1ec4dca87a75d91ee6399057ddcd4c4591b3a0ef557f6a4b4e20937b8ffc1a08749fd22ead98d08a82f6610875cb14cab7775ec51e52dc137f70b4dabacdef3b694b0003660cbf357cf64e13a", 0x5c}, {&(0x7f0000004940)="f65bdcd3b298653590875d21a9dc020df515f084825d291bf232df52e08b15", 0x1f}], 0x6, &(0x7f0000004a00)=[@iv={0x108, 0x117, 0x2, 0xf2, "3a48fa1e133d79016fac12cf1fa443bde1b5435c35c3870f78b7e115447b81c379c77ca1e77f9ae8af4119fda9a21035dfebaa808a01c228e2eb917a27ca433823fcfa30714237d696b7bd1705e1b9ceaa5e7768ccc09bf8a6f2bbf278ff71a3f3bde4ef034eb0a0e75729444ff7a5fd43bd2d2ecbb94cd60a3e8c76bfa728f86e5f4eafb279876b5298d0dc28b66626e664cb3a838f8522322214fab48d3846d396fb93c5565edb5cf00fd50b3b812ed5a7810729fe790ed4c9b4d346a46e4dbe892efceaaef31bfe1577b71da05ad3d66f2bd847203f6387cbcddeacd566a971579c331af38c1965af783ee3371a6cec76"}, @iv={0xf0, 0x117, 0x2, 0xd9, "d3c2838e1b42f87fb72c1cf1034a2d808b392606d3fcaf4a397ada6831f944e3393f4b30c928f1280ee8b93c918c3f213b12affe574957f8dc079a6bfe59914b674f4b98f16931575b499720e8e7f02c872bf74c1c35921b7a6176c0b4769f94542f7f29adf69dc03c31b3ac1a1b52a7c7281cb59f644a29c5735d155884e1f5ff61dab9236fba4639ca3da791e861556ac9f61a94dbeee33b6f4ee33818bbd06dbee4c73c2a33b4312d08049e1ceb77fed0fec71ec88f1f6acedf7b37a1974a258f38ba20ea278bafc3988237b68f94652195ae79f09e78cd"}], 0x1f8, 0x20000080}, {0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004c00)="d39272af50bacb0ec4a62b5be555073362628cba2c775c0d07024600cd207069ed2a089478f22c7262912ae720118cc1442ea28cf5a2a205a9faac7a93901295d8527e7425378b", 0x47}, {&(0x7f0000004c80)="68f15031e5ec29247fbca2284449842fe85ba403753c411e4ea534cb8ea0ffa18ee0ee6d102b4ea6e6", 0x29}, {&(0x7f0000004cc0)}, {&(0x7f0000004d00)="3bdb1ad07e68b60cb3208057506c9bbebad28add0d559e2b3c7c164103f91268f07650162fd6a0d397b4a8c5aa89ed2592f96b6090e7101cd221185c566fa928511273621792ace2ac0f03b82673924bde698afe0844549c845430156dffd7677b06e9ac12f777f08310418e900dc19c6026a4e5fbc57690e4643a1f31ac0756b0668149e03c2cd33befaf46a0c63d622e0913137b7945dfa46e9b65b6e1b17390e1aeea6b773955765c414764bd2fa302960c562bfbcd5afd0013cffa21021a", 0xc0}], 0x4, &(0x7f0000004e00)=[@assoc={0x18, 0x117, 0x4, 0x100000000}, @op={0x18}, @assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5de}, @assoc={0x18, 0x117, 0x4, 0xfff}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0xd8, 0x20000000}, {0x0, 0x0, &(0x7f0000004fc0)=[{&(0x7f0000004f00)="f19f47909f66374ef8ceab0b685ba509a56e8909636bbad22ad4ccb8ffb6c31d588667542ea4242abd36a4f430978c29ded4f81deead85cc44f5eb7e2345d3b0dc800286047874a6ed8f920f413efa8d0fdec8173f2a7d1a9d3346c17efdde2d876e029221146c4621acf183ceaeb0d42fad1655cd390602ee231a20421ca346d67f9aff9eaa74ea6e54993e12bbeb13d757c1af29d2ebb5efa9767be9d980d260408209d723cc92bfe5508f7c58adbb69", 0xb1}], 0x1, &(0x7f0000005000)=ANY=[@ANYBLOB="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"], 0x108, 0x4000001}, {0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000005140)="59899c67d4e4dd86750344cbfe93e48fef13b5138ca2ac8b57f251bb18fa00e39397a5abb175d37ebfba03d0b3e2f95e483b88df05e7e1c527fcc4d639ed90cc6a27615678286ba5325ac2675f940cb9d7e09a8de87edbf75cf49a517f45bd709ae854a052bd", 0x66}, {&(0x7f00000051c0)="0208ca2bde1b7c3ccafdc40385671d62ad2311b765113892015feaaa78537c52196e2b86f993611eb9db4ff4795c1f8cf50707", 0x33}], 0x2, &(0x7f0000005240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x8000}], 0x6, 0x5) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 03:58:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x0, [0x40000002], [0x187]}) [ 2700.103723][ T4860] Process accounting resumed 03:58:01 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) 03:58:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)=0x3) 03:58:01 executing program 1: getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x58) 03:58:01 executing program 0: open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) 03:58:01 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) acct(&(0x7f0000000240)='./file0\x00') 03:58:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) [ 2700.426384][ T4888] Process accounting resumed 03:58:02 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0xffffffffffffffff, 0x0) 03:58:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x0, [0x40000001], [0x187]}) 03:58:02 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) acct(&(0x7f0000000240)='./file0\x00') 03:58:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) 03:58:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x7fffffff, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000180)={0x10002000000, r3, 0x1, 0x3}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f00000001c0)={r3, 0x200}) io_setup(0x6, &(0x7f0000000100)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r4 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f00000000c0)) read$eventfd(r4, &(0x7f0000000140), 0x8) 03:58:02 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) stat(0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) acct(&(0x7f0000000240)='./file0\x00') 03:58:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000040), 0xffffffffffffffb5) read$eventfd(r1, 0x0, 0x0) 03:58:02 executing program 1: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 03:58:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) [ 2700.996162][ T4906] Process accounting resumed 03:58:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000540)={0x0, 0x8}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000005c0)={r2, 0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') r4 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="f6e6aa74fcf4d663ea3cdd40d816791d7af9099d0d5257586a5989561f67cd426a40bbea12b8b604bd2824c0f7dd22c89ffb1e9eab00daff04740f47347ef053f5159154aa039ec6c1e6da0a8217426e60d06d58968eb708ac0314c083323e5802eb5c32374d1fc3aea2d4f18ae3f9bbe263633c6fa4b3179be7e07d603a2a4220bde6", 0x83, 0xfffffffffffffffb) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000380)={0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x30, r7, 0xc00, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}]}, 0x30}, 0x1, 0x0, 0x0, 0x40081}, 0x4840) keyctl$chown(0x4, r4, r5, r6) read$eventfd(r3, &(0x7f0000000300), 0x3a2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f00000003c0)=0x7, 0x4) 03:58:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) [ 2701.211623][ T4919] Process accounting resumed 03:58:03 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000040)={0x3, 0x2, 0x0, 0x200, [], [], [], 0x9, 0x4, 0x8, 0x1, "597856338ca1ee7325a6e7eaac03e25d"}) read$eventfd(r1, 0x0, 0x0) 03:58:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x20}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)) 03:58:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sysinfo(&(0x7f0000001500)=""/190) 03:58:03 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) time(0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r2, 0x0, 0xa198) 03:58:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000002d00)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002c40)=[{{&(0x7f0000000ac0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000b40)=""/155, 0x9b}, {&(0x7f0000000c00)=""/39, 0x27}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/223, 0xdf}], 0x4, &(0x7f0000001d80)=""/108, 0x6c}, 0x8}, {{&(0x7f0000001e00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001e80)=""/66, 0x42}, {&(0x7f0000001f00)=""/191, 0xbf}, {&(0x7f0000001fc0)}, {&(0x7f0000002000)=""/12, 0xc}, {&(0x7f0000002040)=""/121, 0x79}, {&(0x7f00000020c0)=""/227, 0xe3}, {&(0x7f00000021c0)=""/72, 0x48}, {&(0x7f0000002240)=""/164, 0xa4}, {&(0x7f0000002300)=""/13, 0xd}, {&(0x7f0000002340)=""/23, 0x17}], 0xa, &(0x7f0000002440)=""/119, 0x77}, 0x6}, {{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002540)=""/50, 0x32}, {&(0x7f0000002580)=""/215, 0xd7}, {&(0x7f0000002680)=""/137, 0x89}, {&(0x7f0000002740)=""/11, 0xb}, {&(0x7f0000002780)=""/186, 0xba}, {&(0x7f0000002840)=""/225, 0xe1}, {&(0x7f0000002940)=""/57, 0x39}, {&(0x7f0000002980)=""/118, 0x76}, {&(0x7f0000002a00)=""/169, 0xa9}], 0x9, &(0x7f0000002b80)=""/181, 0xb5}, 0x9}], 0x3, 0x40, &(0x7f0000002d40)={r2, r3+10000000}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x103800, 0x0) accept$ax25(r4, &(0x7f0000002d80)={{0x3, @bcast}, [@remote, @remote, @bcast, @netrom, @default, @null, @remote, @default]}, &(0x7f0000002e00)=0x48) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_proto_private(r4, 0x89ea, &(0x7f0000002e40)="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") r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f0000000540)='a&\x9e\x02\x00\x00\x00creat\xcfJ\x96{\xf6\xa7N\xb8>\n\xaf\xf5Jp\xf3\x00A\xbd\x03\xbc\a\x0fW/\xba\xf4x+\xf7\xe87a5\x85\xe2\xf3$\x82_y:\xca\x02\xd4^\x17a\xbb\xd1\xad\xdaA\xa2\xc1\b\xe8\xcd\x03[j\xdb\x85\x00\xb7V;\xf4\x83\xd3\xf0\x17\xf9\xee\xdf\xec\xd2\x94\xb02\x91\x97\xbbI_\xb4\xc4a\x14\xb47Y\xfd\xd5\x18\xae\xb6\xdf\xffHT:8`\\\x96\x01\x81h\x92\xa8\xc4\xfbJ\xbf\x98\xef\xdc\xddd\\\x7f\xf0`\x18\xa4\x97\x8fDi\xb7z\x8bp\xde\xde\xd1[\x7f\"\xb2\x16w\xe3\x9eb\xe7\xd6\x16\xdc\x84a\x88\xc4\x06\xf4\xe5\x02\xc3*3y|a\x95\x83\" \x9b\x8a\xa7\xaaf\x15\xcc.S\xfd\xf06/\xfe\xf7_\x10w\x0e\xa8\b%|\xc3\xb2\xa9x\x15/\xb7\xc4\x02a\n#q\xb1\xbc\x949P?\x1b\x17wtL\xfc\xa45\xc3\xd1\xe4YQ\x17\xaf\x12[\xd4\xe0\x8d\xb2\xb1\xeaB\xee\xe4\'\xb2m\b\xf9\n\xaf\xf3E\x985\xd6\xa2\x94\x14\xfa\xc0\xc2\xe4\xd9D\xc9+\x8e.&\a\xdc\xd5\x15\xed\xf1\xaa\x9b\xaf\x16\x92/\xe7\\\xb2\\\aW(d\x10\xb9\x01s\x84\x1b\xef\xc2){6\v\x83\x9a\xd2\xee\x87|E\x11\xc5\r\xd4\xb3\x19\xb9q\xe8d`\xdb{\xcc\xc6o\xd7\xf4z\xa1E@\x8a\xc5\xb6\xde\xb5\x8bC\x92\xa3\x9c\x9b~\xce\x02\x18\x0e,\xd7\xa4J\xd7D\xc4\xf1L\x8c!\x1a\x92\xd2\xf3\xe6\xed\x80]\xd7\xf7\x8a\x05\x1dM\xe6:\xf4O^\xa8\xe8k\x8b)\tH\x8e\xe0fS\xb7\xf1\xa0\xcb\xca\'j\t)\xeb\xb1Y\x83Tcf\xfc') read$eventfd(r6, &(0x7f0000000300), 0x3a2) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @remote}, 0x10) [ 2701.810794][ T25] audit: type=1800 audit(2000001483.159:287): pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=19763 res=0 03:58:03 executing program 3: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c748) open(0x0, 0x0, 0x0) 03:58:03 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80000000004a0a) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000002c0)={0xfffffffffffffffc}) [ 2701.860908][ T25] audit: type=1804 audit(2000001483.209:288): pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir879551865/syzkaller.BMJPt6/3875/file0" dev="sda1" ino=19763 res=1 03:58:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0xffffffffffffff56, &(0x7f0000000a80)={&(0x7f0000000900)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in6=@ipv4={[0x2], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}}, 0xb8}}, 0x0) [ 2701.946385][ T25] audit: type=1804 audit(2000001483.289:289): pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir879551865/syzkaller.BMJPt6/3875/file0" dev="sda1" ino=19763 res=1 03:58:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:58:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x14, 0x1e, 0x2000000000000301, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:58:03 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = dup(r0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) write$P9_RREAD(r1, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) chdir(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) lgetxattr(0x0, 0x0, &(0x7f0000000cc0)=""/162, 0xa2) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001100)) lchown(0x0, 0x0, 0x0) 03:58:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000002400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x4}) sendmmsg$unix(r2, &(0x7f00000000c0), 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) epoll_wait(r3, &(0x7f0000000040)=[{}], 0x23c, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x152}}], 0xfffffffffffffdab, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x450000) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000000100)={0x7, 0xffffffffffff0000, 0x5, 0xaf7}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r5, &(0x7f0000000300), 0x3a2) read$eventfd(r5, 0x0, 0xfffffffffffffcd4) 03:58:03 executing program 2: open(&(0x7f0000000000)='./file1\x00', 0x400043, 0x140) 03:58:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lgetxattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000f00)='system_u:object_r:crond_unit_file_t:s0\x00', 0x27, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000001080)) lchown(&(0x7f0000000f40)='./file0\x00', 0x0, 0x0) [ 2702.620922][ T25] audit: type=1804 audit(2000001483.969:290): pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir879551865/syzkaller.BMJPt6/3875/file0" dev="sda1" ino=19763 res=1 03:58:04 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:04 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 03:58:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x103, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000002c0)}, 0x6000006) 03:58:04 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x232}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 2702.693032][ T25] audit: type=1804 audit(2000001484.039:291): pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir879551865/syzkaller.BMJPt6/3875/file0" dev="sda1" ino=19763 res=1 03:58:04 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) time(0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r2, 0x0, 0xa198) [ 2702.801123][ T5001] binder: 5000:5001 transaction failed 29189/-22, size 0-0 line 2994 [ 2702.844030][ T25] audit: type=1800 audit(2000001484.189:292): pid=5013 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=19825 res=0 03:58:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xc}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:58:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 2702.875085][ T25] audit: type=1804 audit(2000001484.219:293): pid=5013 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir879551865/syzkaller.BMJPt6/3876/file0" dev="sda1" ino=19825 res=1 [ 2702.908853][T26703] binder: undelivered TRANSACTION_ERROR: 29189 03:58:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x200, 0x4) pwrite64(r0, &(0x7f00000001c0)="d2c90f24d2e8cb4ec477d4a5e25e11ee401b6fa4715e66b69f6be14d60d37c03532a0a2c0c1579a4b113fea69c5aafe51ce03434479055cb1ac685c1b2f55f800eed2764e00dcaca20d3e24f013d2931a3494af7bdc864d9fa1d79da54d10c204f0ee92a", 0x64, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000000)) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x40080, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x110830, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0xed5e0000, 0x0, 0x0, 0x20000fff}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$rxrpc(0x21, 0x2, 0x2) write(0xffffffffffffffff, &(0x7f0000000180), 0x0) epoll_wait(r2, &(0x7f0000000100)=[{}, {}, {}, {}, {}], 0x5, 0xffffffffffffff7f) [ 2702.961659][ T25] audit: type=1804 audit(2000001484.309:294): pid=5019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir879551865/syzkaller.BMJPt6/3876/file0" dev="sda1" ino=19825 res=1 03:58:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x24}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:58:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = dup(r0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f0000000300), 0x3a2) read$eventfd(r2, 0x0, 0xffffffffffffff5c) 03:58:04 executing program 2: 03:58:04 executing program 0: 03:58:04 executing program 0: 03:58:05 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:05 executing program 2: 03:58:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x200, 0x4) pwrite64(r0, &(0x7f00000001c0)="d2c90f24d2e8cb4ec477d4a5e25e11ee401b6fa4715e66b69f6be14d60d37c03532a0a2c0c1579a4b113fea69c5aafe51ce03434479055cb1ac685c1b2f55f800eed2764e00dcaca20d3e24f013d2931a3494af7bdc864d9fa1d79da54d10c204f0ee92a", 0x64, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000000)) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x40080, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x110830, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0xed5e0000, 0x0, 0x0, 0x20000fff}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$rxrpc(0x21, 0x2, 0x2) write(0xffffffffffffffff, &(0x7f0000000180), 0x0) epoll_wait(r2, &(0x7f0000000100)=[{}, {}, {}, {}, {}], 0x5, 0xffffffffffffff7f) 03:58:05 executing program 1: 03:58:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x8c) 03:58:05 executing program 2: 03:58:05 executing program 0: 03:58:05 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:05 executing program 3: 03:58:05 executing program 0: 03:58:05 executing program 2: 03:58:05 executing program 3: 03:58:05 executing program 1: 03:58:05 executing program 0: 03:58:05 executing program 5: 03:58:05 executing program 3: 03:58:05 executing program 1: 03:58:05 executing program 2: 03:58:05 executing program 0: 03:58:06 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:06 executing program 3: 03:58:06 executing program 1: 03:58:06 executing program 2: 03:58:06 executing program 5: 03:58:06 executing program 0: 03:58:06 executing program 1: 03:58:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) 03:58:06 executing program 5: 03:58:06 executing program 3: 03:58:06 executing program 0: 03:58:06 executing program 1: 03:58:06 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:06 executing program 3: 03:58:06 executing program 0: 03:58:06 executing program 5: 03:58:06 executing program 2: 03:58:06 executing program 1: 03:58:06 executing program 3: 03:58:06 executing program 0: 03:58:06 executing program 5: 03:58:06 executing program 2: 03:58:06 executing program 1: 03:58:06 executing program 0: 03:58:07 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:07 executing program 3: 03:58:07 executing program 2: 03:58:07 executing program 5: 03:58:07 executing program 0: 03:58:07 executing program 1: 03:58:07 executing program 1: 03:58:07 executing program 5: 03:58:07 executing program 0: 03:58:07 executing program 3: 03:58:07 executing program 2: 03:58:07 executing program 5: 03:58:08 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:08 executing program 3: 03:58:08 executing program 0: 03:58:08 executing program 2: 03:58:08 executing program 1: 03:58:08 executing program 5: 03:58:08 executing program 2: 03:58:08 executing program 1: 03:58:08 executing program 5: 03:58:08 executing program 3: 03:58:08 executing program 0: 03:58:08 executing program 1: 03:58:08 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:08 executing program 3: 03:58:08 executing program 5: 03:58:08 executing program 2: 03:58:08 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x8000000103e, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x37a287aa) sendfile(r0, r0, 0x0, 0x800000000007) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) write$P9_RFLUSH(r0, 0x0, 0x5a) open$dir(&(0x7f00000000c0)='./file0\x00', 0x27e, 0x0) 03:58:08 executing program 2: socket$key(0xf, 0x3, 0x2) r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/psched\x00') sendfile(r0, r1, 0x0, 0xffffffff) 03:58:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x20000140, 0x0, 0x0, 0x20000170, 0x200001a0], 0x2, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 03:58:08 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) 03:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xffff, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) read$eventfd(r1, &(0x7f0000000300), 0x3a2) read$eventfd(r1, 0x0, 0x0) 03:58:08 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:58:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r3 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) read$eventfd(r3, &(0x7f0000000300), 0x3a2) setsockopt$inet6_udp_int(r3, 0x11, 0x25b6387bb2e6d16a, &(0x7f0000000040)=0x8000, 0x4) read$eventfd(r3, 0x0, 0xffffffffffffffce) 03:58:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r0, &(0x7f0000000300), 0x3a2) 03:58:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:58:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/51) 03:58:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:58:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='net/mcfilter6\x00', 0xffffffffffffffff}, 0x30) r2 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x3000) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r3, &(0x7f0000000300), 0x3a2) read$eventfd(r3, 0x0, 0x0) 03:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/51) 03:58:09 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x0) 03:58:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, &(0x7f0000000300), 0x3a2) 03:58:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/51) [ 2707.916142][ T5250] FAULT_INJECTION: forcing a failure. [ 2707.916142][ T5250] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.964020][ T5250] CPU: 1 PID: 5250 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #39 [ 2707.971954][ T5250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2707.982011][ T5250] Call Trace: [ 2707.982041][ T5250] dump_stack+0x172/0x1f0 [ 2707.982066][ T5250] should_fail.cold+0xa/0x15 [ 2707.982090][ T5250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2707.982112][ T5250] ? ___might_sleep+0x163/0x280 [ 2707.982136][ T5250] __should_failslab+0x121/0x190 [ 2708.009902][ T5250] should_failslab+0x9/0x14 [ 2708.014437][ T5250] kmem_cache_alloc_node_trace+0x270/0x720 [ 2708.020272][ T5250] __kmalloc_node+0x3d/0x70 [ 2708.024790][ T5250] kvmalloc_node+0x68/0x100 [ 2708.029304][ T5250] seq_read+0x832/0x1130 [ 2708.033558][ T5250] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2708.039298][ T5250] ? security_file_permission+0x94/0x380 [ 2708.044956][ T5250] __vfs_read+0x8d/0x110 [ 2708.049206][ T5250] ? seq_dentry+0x2d0/0x2d0 [ 2708.053728][ T5250] vfs_read+0x194/0x3e0 [ 2708.057911][ T5250] ksys_read+0xea/0x1f0 [ 2708.062081][ T5250] ? kernel_write+0x120/0x120 [ 2708.066775][ T5250] ? do_syscall_64+0x26/0x610 [ 2708.071459][ T5250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.077529][ T5250] ? do_syscall_64+0x26/0x610 [ 2708.077552][ T5250] __x64_sys_read+0x73/0xb0 [ 2708.077570][ T5250] do_syscall_64+0x103/0x610 [ 2708.077589][ T5250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.077601][ T5250] RIP: 0033:0x458209 [ 2708.077617][ T5250] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2708.077625][ T5250] RSP: 002b:00007fa13fbcfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2708.129172][ T5250] RAX: ffffffffffffffda RBX: 00007fa13fbcfc90 RCX: 0000000000458209 [ 2708.137153][ T5250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2708.145135][ T5250] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2708.153118][ T5250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa13fbd06d4 [ 2708.161098][ T5250] R13: 00000000004c4dbc R14: 00000000004d8830 R15: 0000000000000005 03:58:09 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:09 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:09 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:09 executing program 5 (fault-call:9 fault-nth:0): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/51) 03:58:09 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x0) [ 2708.369607][ T5268] FAULT_INJECTION: forcing a failure. [ 2708.369607][ T5268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2708.382859][ T5268] CPU: 1 PID: 5268 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #39 [ 2708.390859][ T5268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2708.400944][ T5268] Call Trace: [ 2708.404273][ T5268] dump_stack+0x172/0x1f0 [ 2708.408635][ T5268] should_fail.cold+0xa/0x15 [ 2708.413248][ T5268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2708.418544][ T5274] FAULT_INJECTION: forcing a failure. [ 2708.418544][ T5274] name failslab, interval 1, probability 0, space 0, times 0 [ 2708.419081][ T5268] ? percpu_ref_tryget_live+0xef/0x290 [ 2708.419109][ T5268] should_fail_alloc_page+0x50/0x60 [ 2708.419134][ T5268] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2708.419152][ T5268] ? find_held_lock+0x35/0x130 [ 2708.453028][ T5268] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2708.458776][ T5268] cache_grow_begin+0x9c/0x860 [ 2708.463552][ T5268] ? __kmalloc_node+0x3d/0x70 [ 2708.468236][ T5268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2708.474488][ T5268] kmem_cache_alloc_node_trace+0x658/0x720 [ 2708.480309][ T5268] __kmalloc_node+0x3d/0x70 [ 2708.484826][ T5268] kvmalloc_node+0x68/0x100 [ 2708.489335][ T5268] seq_read+0x832/0x1130 [ 2708.493853][ T5268] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2708.499674][ T5268] ? security_file_permission+0x94/0x380 [ 2708.505315][ T5268] __vfs_read+0x8d/0x110 [ 2708.509561][ T5268] ? seq_dentry+0x2d0/0x2d0 [ 2708.514072][ T5268] vfs_read+0x194/0x3e0 [ 2708.518240][ T5268] ksys_read+0xea/0x1f0 [ 2708.522408][ T5268] ? kernel_write+0x120/0x120 [ 2708.527102][ T5268] ? do_syscall_64+0x26/0x610 [ 2708.531783][ T5268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.537853][ T5268] ? do_syscall_64+0x26/0x610 [ 2708.542630][ T5268] __x64_sys_read+0x73/0xb0 [ 2708.547140][ T5268] do_syscall_64+0x103/0x610 [ 2708.551738][ T5268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.557632][ T5268] RIP: 0033:0x458209 [ 2708.561532][ T5268] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2708.581157][ T5268] RSP: 002b:00007fa13fbcfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2708.589572][ T5268] RAX: ffffffffffffffda RBX: 00007fa13fbcfc90 RCX: 0000000000458209 [ 2708.597802][ T5268] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2708.605801][ T5268] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2708.613775][ T5268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa13fbd06d4 [ 2708.621753][ T5268] R13: 00000000004c4dbc R14: 00000000004d8830 R15: 0000000000000005 [ 2708.629767][ T5274] CPU: 0 PID: 5274 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2708.637675][ T5274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2708.647824][ T5274] Call Trace: [ 2708.651133][ T5274] dump_stack+0x172/0x1f0 [ 2708.655478][ T5274] should_fail.cold+0xa/0x15 [ 2708.660082][ T5274] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2708.665895][ T5274] ? __save_stack_trace+0x99/0x100 [ 2708.671030][ T5274] __should_failslab+0x121/0x190 [ 2708.675985][ T5274] should_failslab+0x9/0x14 [ 2708.680500][ T5274] kmem_cache_alloc+0x47/0x6f0 [ 2708.685286][ T5274] ebitmap_cpy+0xcd/0x270 [ 2708.689654][ T5274] ? hashtab_search+0x1c2/0x250 [ 2708.694518][ T5274] mls_compute_sid+0x5d0/0xf80 [ 2708.699286][ T5274] ? mls_convert_context+0x6d0/0x6d0 [ 2708.704582][ T5274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2708.711527][ T5274] ? sidtab_search_core+0x164/0x210 03:58:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x9, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) [ 2708.716737][ T5274] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 2708.722496][ T5274] security_compute_sid.part.0+0xed5/0x1620 [ 2708.728430][ T5274] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 2708.735121][ T5274] ? process_measurement+0xd5d/0x1570 [ 2708.740609][ T5274] security_transition_sid+0x126/0x190 [ 2708.746100][ T5274] selinux_socket_create+0x35d/0x610 [ 2708.751411][ T5274] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 2708.757314][ T5274] ? find_held_lock+0x35/0x130 [ 2708.762096][ T5274] security_socket_create+0x81/0xc0 03:58:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2708.767311][ T5274] __sock_create+0x8e/0x750 [ 2708.771825][ T5274] ? sctp_id2assoc+0x203/0x2c0 [ 2708.776605][ T5274] sock_create+0x7f/0xa0 [ 2708.780862][ T5274] sctp_do_peeloff+0x1a0/0x470 [ 2708.785639][ T5274] ? sctp_copy_sock+0xe50/0xe50 [ 2708.790500][ T5274] ? lock_downgrade+0x880/0x880 [ 2708.795541][ T5274] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2708.802141][ T5274] ? sctp_do_peeloff+0x470/0x470 [ 2708.807092][ T5274] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2708.813349][ T5274] ? _copy_from_user+0xdd/0x150 [ 2708.818224][ T5274] sctp_getsockopt+0x1ec1/0x673d [ 2708.823167][ T5274] ? lock_downgrade+0x880/0x880 [ 2708.828023][ T5274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2708.834539][ T5274] ? kasan_check_read+0x11/0x20 [ 2708.839423][ T5274] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2708.846292][ T5274] ? avc_has_perm+0x404/0x610 [ 2708.850991][ T5274] ? __fget+0x35a/0x550 [ 2708.855172][ T5274] ? lock_downgrade+0x880/0x880 [ 2708.860040][ T5274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2708.866411][ T5274] ? sock_has_perm+0x209/0x2a0 [ 2708.871196][ T5274] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2708.877299][ T5274] ? kasan_check_write+0x14/0x20 [ 2708.882269][ T5274] sock_common_getsockopt+0x9a/0xe0 [ 2708.887489][ T5274] ? sock_common_getsockopt+0x9a/0xe0 [ 2708.892877][ T5274] __sys_getsockopt+0x168/0x250 [ 2708.897744][ T5274] ? kernel_setsockopt+0x1e0/0x1e0 [ 2708.902872][ T5274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2708.908344][ T5274] ? do_syscall_64+0x26/0x610 [ 2708.913033][ T5274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.919108][ T5274] ? do_syscall_64+0x26/0x610 [ 2708.923813][ T5274] __x64_sys_getsockopt+0xbe/0x150 [ 2708.928937][ T5274] do_syscall_64+0x103/0x610 [ 2708.933717][ T5274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2708.940221][ T5274] RIP: 0033:0x458209 [ 2708.940241][ T5274] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2708.963724][ T5274] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 03:58:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2708.963740][ T5274] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2708.963747][ T5274] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2708.963754][ T5274] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2708.963762][ T5274] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2708.963769][ T5274] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:10 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:10 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x0) 03:58:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2709.107963][ T5291] FAULT_INJECTION: forcing a failure. [ 2709.107963][ T5291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2709.121555][ T5291] CPU: 0 PID: 5291 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #39 [ 2709.129455][ T5291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2709.139513][ T5291] Call Trace: [ 2709.142825][ T5291] dump_stack+0x172/0x1f0 [ 2709.147192][ T5291] should_fail.cold+0xa/0x15 [ 2709.151810][ T5291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2709.157650][ T5291] ? __lock_acquire+0x548/0x3fb0 [ 2709.163117][ T5291] should_fail_alloc_page+0x50/0x60 [ 2709.168330][ T5291] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2709.173721][ T5291] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2709.179454][ T5291] ? find_held_lock+0x35/0x130 [ 2709.184237][ T5291] ? kasan_check_write+0x14/0x20 [ 2709.189209][ T5291] cache_grow_begin+0x9c/0x860 [ 2709.194612][ T5291] ? kasan_check_read+0x11/0x20 [ 2709.199478][ T5291] ? do_raw_spin_unlock+0x57/0x270 [ 2709.204604][ T5291] ____cache_alloc_node+0x17c/0x1e0 [ 2709.209820][ T5291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2709.216081][ T5291] kmem_cache_alloc_node_trace+0xec/0x720 [ 2709.221833][ T5291] __kmalloc_node+0x3d/0x70 [ 2709.226359][ T5291] kvmalloc_node+0x68/0x100 [ 2709.230897][ T5291] seq_read+0x832/0x1130 [ 2709.235158][ T5291] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2709.240903][ T5291] ? security_file_permission+0x94/0x380 [ 2709.246561][ T5291] __vfs_read+0x8d/0x110 [ 2709.250816][ T5291] ? seq_dentry+0x2d0/0x2d0 [ 2709.255337][ T5291] vfs_read+0x194/0x3e0 [ 2709.259516][ T5291] ksys_read+0xea/0x1f0 [ 2709.263689][ T5291] ? kernel_write+0x120/0x120 [ 2709.268384][ T5291] ? do_syscall_64+0x26/0x610 [ 2709.273092][ T5291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2709.279169][ T5291] ? do_syscall_64+0x26/0x610 [ 2709.283867][ T5291] __x64_sys_read+0x73/0xb0 [ 2709.288921][ T5291] do_syscall_64+0x103/0x610 [ 2709.293536][ T5291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2709.299443][ T5291] RIP: 0033:0x458209 [ 2709.303345][ T5291] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2709.303354][ T5291] RSP: 002b:00007fa13fbcfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2709.303369][ T5291] RAX: ffffffffffffffda RBX: 00007fa13fbcfc90 RCX: 0000000000458209 [ 2709.303378][ T5291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2709.303387][ T5291] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2709.303414][ T5291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa13fbd06d4 [ 2709.303431][ T5291] R13: 00000000004c4dbc R14: 00000000004d8830 R15: 0000000000000005 03:58:10 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:10 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x0) 03:58:10 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:10 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) [ 2709.552952][ T5304] FAULT_INJECTION: forcing a failure. [ 2709.552952][ T5304] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2709.575302][ T5311] FAULT_INJECTION: forcing a failure. [ 2709.575302][ T5311] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.588002][ T5311] CPU: 1 PID: 5311 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2709.595911][ T5311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2709.605972][ T5311] Call Trace: [ 2709.609278][ T5311] dump_stack+0x172/0x1f0 [ 2709.613625][ T5311] should_fail.cold+0xa/0x15 [ 2709.618233][ T5311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2709.624058][ T5311] __should_failslab+0x121/0x190 [ 2709.629018][ T5311] should_failslab+0x9/0x14 [ 2709.633522][ T5311] kmem_cache_alloc+0x47/0x6f0 [ 2709.638306][ T5311] ebitmap_cpy+0xcd/0x270 [ 2709.642635][ T5311] ? hashtab_search+0x1c2/0x250 [ 2709.647493][ T5311] mls_compute_sid+0x5d0/0xf80 [ 2709.652262][ T5311] ? mls_convert_context+0x6d0/0x6d0 [ 2709.657551][ T5311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2709.663790][ T5311] ? sidtab_search_core+0x164/0x210 [ 2709.668987][ T5311] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 2709.674714][ T5311] security_compute_sid.part.0+0xed5/0x1620 [ 2709.680619][ T5311] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 2709.687300][ T5311] ? process_measurement+0xd5d/0x1570 [ 2709.692692][ T5311] security_transition_sid+0x126/0x190 [ 2709.698163][ T5311] selinux_socket_create+0x35d/0x610 [ 2709.703451][ T5311] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 2709.709348][ T5311] ? find_held_lock+0x35/0x130 [ 2709.714121][ T5311] security_socket_create+0x81/0xc0 [ 2709.719327][ T5311] __sock_create+0x8e/0x750 [ 2709.723849][ T5311] ? sctp_id2assoc+0x203/0x2c0 [ 2709.728626][ T5311] sock_create+0x7f/0xa0 [ 2709.732877][ T5311] sctp_do_peeloff+0x1a0/0x470 [ 2709.737655][ T5311] ? sctp_copy_sock+0xe50/0xe50 [ 2709.742515][ T5311] ? lock_downgrade+0x880/0x880 [ 2709.747374][ T5311] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2709.753973][ T5311] ? sctp_do_peeloff+0x470/0x470 [ 2709.758928][ T5311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2709.765180][ T5311] ? _copy_from_user+0xdd/0x150 [ 2709.770037][ T5311] sctp_getsockopt+0x1ec1/0x673d [ 2709.774977][ T5311] ? lock_downgrade+0x880/0x880 [ 2709.779855][ T5311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2709.786104][ T5311] ? kasan_check_read+0x11/0x20 [ 2709.790983][ T5311] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2709.797835][ T5311] ? avc_has_perm+0x404/0x610 [ 2709.802521][ T5311] ? __fget+0x35a/0x550 [ 2709.806693][ T5311] ? lock_downgrade+0x880/0x880 [ 2709.811541][ T5311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2709.817799][ T5311] ? sock_has_perm+0x209/0x2a0 [ 2709.822581][ T5311] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2709.828668][ T5311] ? kasan_check_write+0x14/0x20 [ 2709.833637][ T5311] sock_common_getsockopt+0x9a/0xe0 [ 2709.838849][ T5311] ? sock_common_getsockopt+0x9a/0xe0 [ 2709.844240][ T5311] __sys_getsockopt+0x168/0x250 [ 2709.849116][ T5311] ? kernel_setsockopt+0x1e0/0x1e0 [ 2709.854236][ T5311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2709.859697][ T5311] ? do_syscall_64+0x26/0x610 [ 2709.864377][ T5311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2709.870455][ T5311] ? do_syscall_64+0x26/0x610 [ 2709.875141][ T5311] __x64_sys_getsockopt+0xbe/0x150 [ 2709.880265][ T5311] do_syscall_64+0x103/0x610 [ 2709.884891][ T5311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2709.890800][ T5311] RIP: 0033:0x458209 [ 2709.894698][ T5311] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2709.914307][ T5311] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2709.922724][ T5311] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2709.930695][ T5311] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2709.938665][ T5311] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2709.946639][ T5311] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 03:58:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2709.954608][ T5311] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 [ 2710.007579][ T5304] CPU: 0 PID: 5304 Comm: syz-executor.0 Not tainted 5.1.0-rc2+ #39 [ 2710.015520][ T5304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2710.026458][ T5304] Call Trace: [ 2710.029774][ T5304] dump_stack+0x172/0x1f0 [ 2710.034127][ T5304] should_fail.cold+0xa/0x15 [ 2710.038745][ T5304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2710.044661][ T5304] ? ___might_sleep+0x163/0x280 [ 2710.049533][ T5304] should_fail_alloc_page+0x50/0x60 [ 2710.054770][ T5304] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2710.060158][ T5304] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2710.065895][ T5304] ? cache_grow_begin+0x594/0x860 [ 2710.070932][ T5304] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2710.076230][ T5304] ? trace_hardirqs_on+0x67/0x230 [ 2710.081267][ T5304] cache_grow_begin+0x9c/0x860 [ 2710.086468][ T5304] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2710.092731][ T5304] ? __cpuset_node_allowed+0x136/0x540 [ 2710.098230][ T5304] fallback_alloc+0x1fd/0x2d0 [ 2710.102926][ T5304] ____cache_alloc_node+0x1be/0x1e0 [ 2710.108147][ T5304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2710.114621][ T5304] kmem_cache_alloc_node_trace+0xec/0x720 [ 2710.120366][ T5304] __kmalloc_node+0x3d/0x70 [ 2710.125250][ T5304] kvmalloc_node+0x68/0x100 [ 2710.129755][ T5304] seq_read+0x832/0x1130 [ 2710.134003][ T5304] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2710.139740][ T5304] ? security_file_permission+0x94/0x380 [ 2710.145376][ T5304] __vfs_read+0x8d/0x110 [ 2710.149631][ T5304] ? seq_dentry+0x2d0/0x2d0 [ 2710.154140][ T5304] vfs_read+0x194/0x3e0 [ 2710.158305][ T5304] ksys_read+0xea/0x1f0 [ 2710.162477][ T5304] ? kernel_write+0x120/0x120 [ 2710.167159][ T5304] ? do_syscall_64+0x26/0x610 [ 2710.171835][ T5304] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2710.177915][ T5304] ? do_syscall_64+0x26/0x610 [ 2710.182599][ T5304] __x64_sys_read+0x73/0xb0 [ 2710.187104][ T5304] do_syscall_64+0x103/0x610 [ 2710.191702][ T5304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2710.197591][ T5304] RIP: 0033:0x458209 [ 2710.201489][ T5304] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2710.221094][ T5304] RSP: 002b:00007fa13fbcfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2710.229509][ T5304] RAX: ffffffffffffffda RBX: 00007fa13fbcfc90 RCX: 0000000000458209 [ 2710.237480][ T5304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2710.245551][ T5304] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:58:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x2, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) [ 2710.253520][ T5304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa13fbd06d4 [ 2710.261503][ T5304] R13: 00000000004c4dbc R14: 00000000004d8830 R15: 0000000000000005 03:58:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:11 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x1a0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:11 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x0) 03:58:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) read$eventfd(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2710.530661][ T5338] FAULT_INJECTION: forcing a failure. [ 2710.530661][ T5338] name failslab, interval 1, probability 0, space 0, times 0 [ 2710.544046][ T5338] CPU: 1 PID: 5338 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2710.552030][ T5338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2710.562112][ T5338] Call Trace: [ 2710.565436][ T5338] dump_stack+0x172/0x1f0 [ 2710.569788][ T5338] should_fail.cold+0xa/0x15 [ 2710.574410][ T5338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2710.580245][ T5338] __should_failslab+0x121/0x190 [ 2710.585197][ T5338] should_failslab+0x9/0x14 [ 2710.589715][ T5338] kmem_cache_alloc+0x47/0x6f0 [ 2710.594502][ T5338] ebitmap_cpy+0xcd/0x270 [ 2710.598935][ T5338] ? hashtab_search+0x1c2/0x250 [ 2710.603811][ T5338] mls_compute_sid+0x5d0/0xf80 [ 2710.608604][ T5338] ? mls_convert_context+0x6d0/0x6d0 [ 2710.613925][ T5338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2710.620193][ T5338] ? sidtab_search_core+0x164/0x210 [ 2710.625426][ T5338] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 2710.631167][ T5338] security_compute_sid.part.0+0xed5/0x1620 [ 2710.637093][ T5338] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 2710.643786][ T5338] ? process_measurement+0xd5d/0x1570 [ 2710.649196][ T5338] security_transition_sid+0x126/0x190 [ 2710.654674][ T5338] selinux_socket_create+0x35d/0x610 [ 2710.659973][ T5338] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 2710.665869][ T5338] ? find_held_lock+0x35/0x130 [ 2710.670658][ T5338] security_socket_create+0x81/0xc0 [ 2710.675975][ T5338] __sock_create+0x8e/0x750 [ 2710.680520][ T5338] ? sctp_id2assoc+0x203/0x2c0 [ 2710.685285][ T5338] sock_create+0x7f/0xa0 [ 2710.689543][ T5338] sctp_do_peeloff+0x1a0/0x470 [ 2710.694317][ T5338] ? sctp_copy_sock+0xe50/0xe50 [ 2710.699183][ T5338] ? lock_downgrade+0x880/0x880 [ 2710.704032][ T5338] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2710.710615][ T5338] ? sctp_do_peeloff+0x470/0x470 [ 2710.715571][ T5338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2710.721818][ T5338] ? _copy_from_user+0xdd/0x150 [ 2710.726675][ T5338] sctp_getsockopt+0x1ec1/0x673d [ 2710.731615][ T5338] ? lock_downgrade+0x880/0x880 [ 2710.736462][ T5338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2710.742702][ T5338] ? kasan_check_read+0x11/0x20 [ 2710.747559][ T5338] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2710.754424][ T5338] ? avc_has_perm+0x404/0x610 [ 2710.759124][ T5338] ? __fget+0x35a/0x550 [ 2710.763297][ T5338] ? lock_downgrade+0x880/0x880 [ 2710.768158][ T5338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2710.774432][ T5338] ? sock_has_perm+0x209/0x2a0 [ 2710.779319][ T5338] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2710.785428][ T5338] ? kasan_check_write+0x14/0x20 [ 2710.790375][ T5338] sock_common_getsockopt+0x9a/0xe0 [ 2710.795582][ T5338] ? sock_common_getsockopt+0x9a/0xe0 [ 2710.800965][ T5338] __sys_getsockopt+0x168/0x250 [ 2710.805830][ T5338] ? kernel_setsockopt+0x1e0/0x1e0 [ 2710.810966][ T5338] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2710.816444][ T5338] ? do_syscall_64+0x26/0x610 [ 2710.821123][ T5338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2710.827186][ T5338] ? do_syscall_64+0x26/0x610 [ 2710.831913][ T5338] __x64_sys_getsockopt+0xbe/0x150 [ 2710.837031][ T5338] do_syscall_64+0x103/0x610 [ 2710.841632][ T5338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2710.847558][ T5338] RIP: 0033:0x458209 [ 2710.851452][ T5338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2710.871128][ T5338] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2710.879530][ T5338] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2710.887508][ T5338] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2710.895512][ T5338] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2710.903500][ T5338] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2710.911460][ T5338] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:12 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x2) 03:58:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") read$eventfd(0xffffffffffffffff, &(0x7f0000000300), 0x3a2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x3) 03:58:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x3, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:12 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x4) 03:58:12 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x3f00) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:12 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:12 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x5) [ 2711.499101][ T5390] FAULT_INJECTION: forcing a failure. [ 2711.499101][ T5390] name failslab, interval 1, probability 0, space 0, times 0 [ 2711.532778][ T5390] CPU: 1 PID: 5390 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2711.540716][ T5390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2711.550781][ T5390] Call Trace: [ 2711.554093][ T5390] dump_stack+0x172/0x1f0 [ 2711.558447][ T5390] should_fail.cold+0xa/0x15 [ 2711.563046][ T5390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2711.568863][ T5390] ? ___might_sleep+0x163/0x280 [ 2711.573732][ T5390] __should_failslab+0x121/0x190 [ 2711.578676][ T5390] ? sock_destroy_inode+0x60/0x60 [ 2711.583701][ T5390] should_failslab+0x9/0x14 [ 2711.588206][ T5390] kmem_cache_alloc+0x2b2/0x6f0 [ 2711.593056][ T5390] ? selinux_socket_create+0x210/0x610 [ 2711.598520][ T5390] ? sock_destroy_inode+0x60/0x60 [ 2711.603553][ T5390] sock_alloc_inode+0x1d/0x260 [ 2711.608320][ T5390] alloc_inode+0x66/0x190 [ 2711.612653][ T5390] new_inode_pseudo+0x19/0xf0 [ 2711.617336][ T5390] sock_alloc+0x41/0x270 [ 2711.621605][ T5390] __sock_create+0xc0/0x750 [ 2711.626194][ T5390] ? sctp_id2assoc+0x203/0x2c0 [ 2711.630963][ T5390] sock_create+0x7f/0xa0 [ 2711.635212][ T5390] sctp_do_peeloff+0x1a0/0x470 [ 2711.639979][ T5390] ? sctp_copy_sock+0xe50/0xe50 [ 2711.644836][ T5390] ? lock_downgrade+0x880/0x880 [ 2711.649691][ T5390] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2711.656316][ T5390] ? sctp_do_peeloff+0x470/0x470 [ 2711.661256][ T5390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2711.667499][ T5390] ? _copy_from_user+0xdd/0x150 [ 2711.672351][ T5390] sctp_getsockopt+0x1ec1/0x673d [ 2711.677300][ T5390] ? lock_downgrade+0x880/0x880 [ 2711.682152][ T5390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2711.688411][ T5390] ? kasan_check_read+0x11/0x20 [ 2711.693274][ T5390] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2711.700149][ T5390] ? avc_has_perm+0x404/0x610 [ 2711.704846][ T5390] ? __fget+0x35a/0x550 [ 2711.709015][ T5390] ? lock_downgrade+0x880/0x880 [ 2711.713867][ T5390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2711.720119][ T5390] ? sock_has_perm+0x209/0x2a0 [ 2711.724975][ T5390] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2711.731068][ T5390] ? kasan_check_write+0x14/0x20 [ 2711.736040][ T5390] sock_common_getsockopt+0x9a/0xe0 [ 2711.741239][ T5390] ? sock_common_getsockopt+0x9a/0xe0 [ 2711.746615][ T5390] __sys_getsockopt+0x168/0x250 [ 2711.751476][ T5390] ? kernel_setsockopt+0x1e0/0x1e0 [ 2711.756598][ T5390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2711.762064][ T5390] ? do_syscall_64+0x26/0x610 [ 2711.766929][ T5390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2711.773006][ T5390] ? do_syscall_64+0x26/0x610 [ 2711.777699][ T5390] __x64_sys_getsockopt+0xbe/0x150 [ 2711.782818][ T5390] do_syscall_64+0x103/0x610 [ 2711.787422][ T5390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2711.793572][ T5390] RIP: 0033:0x458209 [ 2711.797466][ T5390] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2711.817071][ T5390] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2711.825492][ T5390] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2711.833462][ T5390] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2711.841433][ T5390] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 03:58:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:13 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) [ 2711.849415][ T5390] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2711.857385][ T5390] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x6) [ 2711.977134][ T5390] socket: no more sockets 03:58:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x4, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:13 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x7) 03:58:13 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:13 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:13 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x9) 03:58:13 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xa) 03:58:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2712.425112][ T5445] FAULT_INJECTION: forcing a failure. [ 2712.425112][ T5445] name failslab, interval 1, probability 0, space 0, times 0 [ 2712.477892][ T5445] CPU: 0 PID: 5445 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2712.486194][ T5445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2712.496273][ T5445] Call Trace: [ 2712.499624][ T5445] dump_stack+0x172/0x1f0 [ 2712.503993][ T5445] should_fail.cold+0xa/0x15 [ 2712.508624][ T5445] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2712.514468][ T5445] ? ___might_sleep+0x163/0x280 [ 2712.519344][ T5445] __should_failslab+0x121/0x190 [ 2712.524300][ T5445] ? sock_destroy_inode+0x60/0x60 [ 2712.529338][ T5445] should_failslab+0x9/0x14 [ 2712.533868][ T5445] kmem_cache_alloc_trace+0x2d1/0x760 [ 2712.539251][ T5445] ? kmem_cache_alloc+0x32e/0x6f0 [ 2712.544293][ T5445] ? selinux_socket_create+0x210/0x610 [ 2712.549762][ T5445] ? sock_destroy_inode+0x60/0x60 [ 2712.554786][ T5445] sock_alloc_inode+0x63/0x260 [ 2712.559565][ T5445] alloc_inode+0x66/0x190 [ 2712.563918][ T5445] new_inode_pseudo+0x19/0xf0 [ 2712.568610][ T5445] sock_alloc+0x41/0x270 [ 2712.572857][ T5445] __sock_create+0xc0/0x750 [ 2712.577374][ T5445] ? sctp_id2assoc+0x203/0x2c0 [ 2712.582161][ T5445] sock_create+0x7f/0xa0 [ 2712.586411][ T5445] sctp_do_peeloff+0x1a0/0x470 [ 2712.591164][ T5445] ? sctp_copy_sock+0xe50/0xe50 [ 2712.596006][ T5445] ? lock_downgrade+0x880/0x880 [ 2712.600865][ T5445] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2712.607542][ T5445] ? sctp_do_peeloff+0x470/0x470 [ 2712.612484][ T5445] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2712.618717][ T5445] ? _copy_from_user+0xdd/0x150 [ 2712.623575][ T5445] sctp_getsockopt+0x1ec1/0x673d [ 2712.628534][ T5445] ? lock_downgrade+0x880/0x880 [ 2712.633372][ T5445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2712.639631][ T5445] ? kasan_check_read+0x11/0x20 [ 2712.644505][ T5445] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2712.651364][ T5445] ? avc_has_perm+0x404/0x610 [ 2712.656045][ T5445] ? __fget+0x35a/0x550 [ 2712.660204][ T5445] ? lock_downgrade+0x880/0x880 [ 2712.665051][ T5445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2712.671287][ T5445] ? sock_has_perm+0x209/0x2a0 [ 2712.676043][ T5445] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2712.682299][ T5445] ? kasan_check_write+0x14/0x20 [ 2712.687353][ T5445] sock_common_getsockopt+0x9a/0xe0 [ 2712.692565][ T5445] ? sock_common_getsockopt+0x9a/0xe0 [ 2712.697940][ T5445] __sys_getsockopt+0x168/0x250 [ 2712.702788][ T5445] ? kernel_setsockopt+0x1e0/0x1e0 [ 2712.707915][ T5445] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2712.713403][ T5445] ? do_syscall_64+0x26/0x610 [ 2712.718089][ T5445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2712.724160][ T5445] ? do_syscall_64+0x26/0x610 [ 2712.728843][ T5445] __x64_sys_getsockopt+0xbe/0x150 [ 2712.733960][ T5445] do_syscall_64+0x103/0x610 [ 2712.738724][ T5445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2712.744649][ T5445] RIP: 0033:0x458209 [ 2712.748555][ T5445] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2712.768176][ T5445] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2712.776613][ T5445] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2712.784607][ T5445] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2712.792579][ T5445] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2712.800576][ T5445] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2712.808548][ T5445] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 [ 2712.836499][ T5445] socket: no more sockets 03:58:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:14 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x34000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:14 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x10) 03:58:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x1e) 03:58:14 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x48) 03:58:14 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x4c) 03:58:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2713.308998][ T5491] FAULT_INJECTION: forcing a failure. [ 2713.308998][ T5491] name failslab, interval 1, probability 0, space 0, times 0 [ 2713.352361][ T5491] CPU: 1 PID: 5491 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2713.360323][ T5491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2713.370406][ T5491] Call Trace: [ 2713.373737][ T5491] dump_stack+0x172/0x1f0 [ 2713.378094][ T5491] should_fail.cold+0xa/0x15 [ 2713.382716][ T5491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2713.388545][ T5491] ? ___might_sleep+0x163/0x280 [ 2713.393413][ T5491] __should_failslab+0x121/0x190 [ 2713.398446][ T5491] should_failslab+0x9/0x14 [ 2713.402966][ T5491] kmem_cache_alloc+0x2b2/0x6f0 [ 2713.407822][ T5491] ? __put_user_ns+0x70/0x70 [ 2713.412418][ T5491] ? sock_alloc_inode+0x63/0x260 [ 2713.417459][ T5491] ? lockdep_init_map+0x1be/0x6d0 [ 2713.422491][ T5491] security_inode_alloc+0x39/0x160 [ 2713.427619][ T5491] inode_init_always+0x56e/0xb50 [ 2713.432569][ T5491] alloc_inode+0x83/0x190 [ 2713.436987][ T5491] new_inode_pseudo+0x19/0xf0 [ 2713.441668][ T5491] sock_alloc+0x41/0x270 [ 2713.445921][ T5491] __sock_create+0xc0/0x750 [ 2713.450430][ T5491] ? sctp_id2assoc+0x203/0x2c0 [ 2713.455222][ T5491] sock_create+0x7f/0xa0 [ 2713.459473][ T5491] sctp_do_peeloff+0x1a0/0x470 [ 2713.464245][ T5491] ? sctp_copy_sock+0xe50/0xe50 [ 2713.469129][ T5491] ? lock_downgrade+0x880/0x880 [ 2713.473995][ T5491] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2713.480598][ T5491] ? sctp_do_peeloff+0x470/0x470 [ 2713.485563][ T5491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2713.491811][ T5491] ? _copy_from_user+0xdd/0x150 [ 2713.496680][ T5491] sctp_getsockopt+0x1ec1/0x673d [ 2713.501640][ T5491] ? lock_downgrade+0x880/0x880 [ 2713.506496][ T5491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2713.512742][ T5491] ? kasan_check_read+0x11/0x20 [ 2713.517599][ T5491] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2713.524448][ T5491] ? avc_has_perm+0x404/0x610 [ 2713.529133][ T5491] ? __fget+0x35a/0x550 [ 2713.533294][ T5491] ? lock_downgrade+0x880/0x880 [ 2713.538142][ T5491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2713.544388][ T5491] ? sock_has_perm+0x209/0x2a0 [ 2713.549171][ T5491] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2713.555251][ T5491] ? kasan_check_write+0x14/0x20 [ 2713.560218][ T5491] sock_common_getsockopt+0x9a/0xe0 [ 2713.565426][ T5491] ? sock_common_getsockopt+0x9a/0xe0 [ 2713.570802][ T5491] __sys_getsockopt+0x168/0x250 [ 2713.575656][ T5491] ? kernel_setsockopt+0x1e0/0x1e0 [ 2713.580771][ T5491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2713.586244][ T5491] ? do_syscall_64+0x26/0x610 [ 2713.590927][ T5491] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2713.596991][ T5491] ? do_syscall_64+0x26/0x610 [ 2713.601685][ T5491] __x64_sys_getsockopt+0xbe/0x150 [ 2713.606802][ T5491] do_syscall_64+0x103/0x610 [ 2713.611405][ T5491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2713.617299][ T5491] RIP: 0033:0x458209 [ 2713.621196][ T5491] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2713.640812][ T5491] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2713.649315][ T5491] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2713.657286][ T5491] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2713.665281][ T5491] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2713.673266][ T5491] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2713.681238][ T5491] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 [ 2713.721711][ T5491] socket: no more sockets 03:58:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x5d) 03:58:15 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x7, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:15 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x400300) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x68) 03:58:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x6c) 03:58:15 executing program 1 (fault-call:3 fault-nth:6): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:15 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x74) 03:58:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2714.231782][ T5533] FAULT_INJECTION: forcing a failure. [ 2714.231782][ T5533] name failslab, interval 1, probability 0, space 0, times 0 [ 2714.255046][ T5533] CPU: 0 PID: 5533 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2714.262968][ T5533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2714.273032][ T5533] Call Trace: [ 2714.276332][ T5533] dump_stack+0x172/0x1f0 [ 2714.280665][ T5533] should_fail.cold+0xa/0x15 [ 2714.285257][ T5533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2714.291054][ T5533] ? ___might_sleep+0x163/0x280 [ 2714.295894][ T5533] __should_failslab+0x121/0x190 [ 2714.300838][ T5533] should_failslab+0x9/0x14 [ 2714.305342][ T5533] kmem_cache_alloc+0x2b2/0x6f0 [ 2714.310185][ T5533] ? inet6_create+0x2ea/0xf90 [ 2714.314865][ T5533] sk_prot_alloc+0x67/0x2e0 [ 2714.319376][ T5533] ? lock_downgrade+0x880/0x880 [ 2714.324247][ T5533] sk_alloc+0x39/0xf70 [ 2714.328333][ T5533] inet6_create+0x360/0xf90 [ 2714.332859][ T5533] __sock_create+0x3e6/0x750 [ 2714.337472][ T5533] sock_create+0x7f/0xa0 [ 2714.341743][ T5533] sctp_do_peeloff+0x1a0/0x470 [ 2714.346525][ T5533] ? sctp_copy_sock+0xe50/0xe50 [ 2714.351406][ T5533] ? lock_downgrade+0x880/0x880 [ 2714.356301][ T5533] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2714.362903][ T5533] ? sctp_do_peeloff+0x470/0x470 [ 2714.367950][ T5533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2714.374205][ T5533] ? _copy_from_user+0xdd/0x150 [ 2714.379076][ T5533] sctp_getsockopt+0x1ec1/0x673d [ 2714.384028][ T5533] ? lock_downgrade+0x880/0x880 [ 2714.388890][ T5533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2714.395148][ T5533] ? kasan_check_read+0x11/0x20 [ 2714.400011][ T5533] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2714.407137][ T5533] ? avc_has_perm+0x404/0x610 [ 2714.412419][ T5533] ? __fget+0x35a/0x550 [ 2714.416597][ T5533] ? lock_downgrade+0x880/0x880 [ 2714.421463][ T5533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2714.427710][ T5533] ? sock_has_perm+0x209/0x2a0 [ 2714.432503][ T5533] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2714.438598][ T5533] ? kasan_check_write+0x14/0x20 [ 2714.443562][ T5533] sock_common_getsockopt+0x9a/0xe0 [ 2714.448760][ T5533] ? sock_common_getsockopt+0x9a/0xe0 [ 2714.454142][ T5533] __sys_getsockopt+0x168/0x250 [ 2714.458980][ T5533] ? kernel_setsockopt+0x1e0/0x1e0 [ 2714.464091][ T5533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2714.469561][ T5533] ? do_syscall_64+0x26/0x610 [ 2714.474250][ T5533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2714.480326][ T5533] ? do_syscall_64+0x26/0x610 [ 2714.485013][ T5533] __x64_sys_getsockopt+0xbe/0x150 [ 2714.490126][ T5533] do_syscall_64+0x103/0x610 [ 2714.494718][ T5533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2714.500593][ T5533] RIP: 0033:0x458209 [ 2714.504476][ T5533] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2714.524152][ T5533] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 03:58:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:15 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) [ 2714.532547][ T5533] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2714.540502][ T5533] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2714.548473][ T5533] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2714.556449][ T5533] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2714.564429][ T5533] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x8, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:16 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x1000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x7a) 03:58:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:16 executing program 1 (fault-call:3 fault-nth:7): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xd0) 03:58:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2715.216325][ T5576] FAULT_INJECTION: forcing a failure. [ 2715.216325][ T5576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2715.229571][ T5576] CPU: 1 PID: 5576 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2715.237451][ T5576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2715.247513][ T5576] Call Trace: [ 2715.250810][ T5576] dump_stack+0x172/0x1f0 [ 2715.255153][ T5576] should_fail.cold+0xa/0x15 [ 2715.259764][ T5576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2715.265578][ T5576] ? percpu_ref_tryget_live+0xef/0x290 [ 2715.265606][ T5576] should_fail_alloc_page+0x50/0x60 [ 2715.265627][ T5576] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2715.281628][ T5576] ? find_held_lock+0x35/0x130 [ 2715.281649][ T5576] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2715.281686][ T5576] cache_grow_begin+0x9c/0x860 [ 2715.281703][ T5576] ? sk_prot_alloc+0x67/0x2e0 [ 2715.281720][ T5576] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2715.281748][ T5576] kmem_cache_alloc+0x62d/0x6f0 [ 2715.312725][ T5576] ? inet6_create+0x2ea/0xf90 [ 2715.317419][ T5576] sk_prot_alloc+0x67/0x2e0 [ 2715.321944][ T5576] ? lock_downgrade+0x880/0x880 [ 2715.326808][ T5576] sk_alloc+0x39/0xf70 [ 2715.330893][ T5576] inet6_create+0x360/0xf90 [ 2715.335432][ T5576] __sock_create+0x3e6/0x750 [ 2715.340042][ T5576] sock_create+0x7f/0xa0 [ 2715.344304][ T5576] sctp_do_peeloff+0x1a0/0x470 [ 2715.349082][ T5576] ? sctp_copy_sock+0xe50/0xe50 [ 2715.354189][ T5576] ? lock_downgrade+0x880/0x880 [ 2715.359075][ T5576] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2715.365680][ T5576] ? sctp_do_peeloff+0x470/0x470 [ 2715.370630][ T5576] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2715.376890][ T5576] ? _copy_from_user+0xdd/0x150 [ 2715.381751][ T5576] sctp_getsockopt+0x1ec1/0x673d [ 2715.386676][ T5576] ? lock_downgrade+0x880/0x880 [ 2715.391524][ T5576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2715.397774][ T5576] ? kasan_check_read+0x11/0x20 [ 2715.402663][ T5576] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2715.409523][ T5576] ? avc_has_perm+0x404/0x610 [ 2715.414224][ T5576] ? __fget+0x35a/0x550 [ 2715.418673][ T5576] ? lock_downgrade+0x880/0x880 [ 2715.423522][ T5576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2715.429778][ T5576] ? sock_has_perm+0x209/0x2a0 [ 2715.434556][ T5576] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2715.440648][ T5576] ? kasan_check_write+0x14/0x20 [ 2715.445610][ T5576] sock_common_getsockopt+0x9a/0xe0 [ 2715.450812][ T5576] ? sock_common_getsockopt+0x9a/0xe0 [ 2715.456301][ T5576] __sys_getsockopt+0x168/0x250 [ 2715.461160][ T5576] ? kernel_setsockopt+0x1e0/0x1e0 [ 2715.466286][ T5576] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2715.471756][ T5576] ? do_syscall_64+0x26/0x610 [ 2715.476441][ T5576] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2715.482519][ T5576] ? do_syscall_64+0x26/0x610 [ 2715.487215][ T5576] __x64_sys_getsockopt+0xbe/0x150 [ 2715.492330][ T5576] do_syscall_64+0x103/0x610 [ 2715.496931][ T5576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2715.502830][ T5576] RIP: 0033:0x458209 [ 2715.506848][ T5576] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2715.526448][ T5576] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2715.534871][ T5576] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2715.542852][ T5576] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2715.550874][ T5576] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2715.558861][ T5576] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 03:58:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xa, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xfe) [ 2715.566848][ T5576] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:17 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x1a0) 03:58:17 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x13f00e0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x223) 03:58:17 executing program 1 (fault-call:3 fault-nth:8): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x300) [ 2716.129218][ T5619] FAULT_INJECTION: forcing a failure. [ 2716.129218][ T5619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2716.142469][ T5619] CPU: 1 PID: 5619 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2716.150365][ T5619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2716.160446][ T5619] Call Trace: [ 2716.163761][ T5619] dump_stack+0x172/0x1f0 [ 2716.168105][ T5619] should_fail.cold+0xa/0x15 [ 2716.172699][ T5619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2716.178510][ T5619] ? __lock_acquire+0x548/0x3fb0 [ 2716.183455][ T5619] should_fail_alloc_page+0x50/0x60 [ 2716.188652][ T5619] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2716.194505][ T5619] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2716.200224][ T5619] ? find_held_lock+0x35/0x130 [ 2716.204996][ T5619] ? kasan_check_write+0x14/0x20 [ 2716.209944][ T5619] cache_grow_begin+0x9c/0x860 [ 2716.214709][ T5619] ? kasan_check_read+0x11/0x20 [ 2716.219566][ T5619] ? do_raw_spin_unlock+0x57/0x270 [ 2716.224770][ T5619] ____cache_alloc_node+0x17c/0x1e0 [ 2716.229972][ T5619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2716.236218][ T5619] kmem_cache_alloc+0x1e8/0x6f0 [ 2716.241087][ T5619] ? inet6_create+0x2ea/0xf90 [ 2716.245770][ T5619] sk_prot_alloc+0x67/0x2e0 [ 2716.250273][ T5619] ? lock_downgrade+0x880/0x880 [ 2716.255127][ T5619] sk_alloc+0x39/0xf70 [ 2716.259204][ T5619] inet6_create+0x360/0xf90 [ 2716.263712][ T5619] __sock_create+0x3e6/0x750 [ 2716.268309][ T5619] sock_create+0x7f/0xa0 [ 2716.272557][ T5619] sctp_do_peeloff+0x1a0/0x470 [ 2716.277320][ T5619] ? sctp_copy_sock+0xe50/0xe50 [ 2716.282174][ T5619] ? lock_downgrade+0x880/0x880 [ 2716.287045][ T5619] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2716.293633][ T5619] ? sctp_do_peeloff+0x470/0x470 [ 2716.298578][ T5619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2716.304823][ T5619] ? _copy_from_user+0xdd/0x150 [ 2716.309678][ T5619] sctp_getsockopt+0x1ec1/0x673d [ 2716.314622][ T5619] ? lock_downgrade+0x880/0x880 [ 2716.319469][ T5619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2716.325714][ T5619] ? kasan_check_read+0x11/0x20 [ 2716.330571][ T5619] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2716.337429][ T5619] ? avc_has_perm+0x404/0x610 [ 2716.342122][ T5619] ? __fget+0x35a/0x550 [ 2716.346304][ T5619] ? lock_downgrade+0x880/0x880 [ 2716.351155][ T5619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2716.357411][ T5619] ? sock_has_perm+0x209/0x2a0 [ 2716.362178][ T5619] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2716.368271][ T5619] ? kasan_check_write+0x14/0x20 [ 2716.373220][ T5619] sock_common_getsockopt+0x9a/0xe0 [ 2716.378424][ T5619] ? sock_common_getsockopt+0x9a/0xe0 [ 2716.383800][ T5619] __sys_getsockopt+0x168/0x250 [ 2716.388654][ T5619] ? kernel_setsockopt+0x1e0/0x1e0 [ 2716.393768][ T5619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2716.399226][ T5619] ? do_syscall_64+0x26/0x610 [ 2716.403899][ T5619] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2716.409967][ T5619] ? do_syscall_64+0x26/0x610 [ 2716.414654][ T5619] __x64_sys_getsockopt+0xbe/0x150 [ 2716.419781][ T5619] do_syscall_64+0x103/0x610 [ 2716.424377][ T5619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2716.430286][ T5619] RIP: 0033:0x458209 [ 2716.434180][ T5619] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2716.453787][ T5619] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2716.462213][ T5619] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2716.470188][ T5619] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 03:58:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2716.478164][ T5619] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2716.486151][ T5619] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2716.494119][ T5619] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xb, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:17 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x500) 03:58:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x600) 03:58:18 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x4000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:18 executing program 1 (fault-call:3 fault-nth:9): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x6e3) [ 2717.107486][ T5660] FAULT_INJECTION: forcing a failure. [ 2717.107486][ T5660] name failslab, interval 1, probability 0, space 0, times 0 03:58:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2717.158009][ T5660] CPU: 0 PID: 5660 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2717.165953][ T5660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2717.165960][ T5660] Call Trace: [ 2717.165988][ T5660] dump_stack+0x172/0x1f0 [ 2717.166013][ T5660] should_fail.cold+0xa/0x15 [ 2717.166032][ T5660] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2717.166054][ T5660] ? ___might_sleep+0x163/0x280 [ 2717.166088][ T5660] __should_failslab+0x121/0x190 [ 2717.204457][ T5660] should_failslab+0x9/0x14 [ 2717.204477][ T5660] kmem_cache_alloc_trace+0x2d1/0x760 [ 2717.204503][ T5660] sctp_endpoint_new+0x100/0xed0 [ 2717.204525][ T5660] sctp_init_sock+0xc2e/0x1360 [ 2717.204541][ T5660] ? kasan_check_write+0x14/0x20 [ 2717.204556][ T5660] ? sock_init_data+0x8de/0xc70 [ 2717.204567][ T5660] ? sctp_destroy_sock+0x3e0/0x3e0 [ 2717.204593][ T5660] inet6_create+0x9cd/0xf90 [ 2717.243539][ T5660] __sock_create+0x3e6/0x750 [ 2717.248147][ T5660] sock_create+0x7f/0xa0 [ 2717.252428][ T5660] sctp_do_peeloff+0x1a0/0x470 03:58:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x700) [ 2717.257243][ T5660] ? sctp_copy_sock+0xe50/0xe50 [ 2717.262110][ T5660] ? lock_downgrade+0x880/0x880 [ 2717.266972][ T5660] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2717.273566][ T5660] ? sctp_do_peeloff+0x470/0x470 [ 2717.278507][ T5660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2717.284759][ T5660] ? _copy_from_user+0xdd/0x150 [ 2717.289629][ T5660] sctp_getsockopt+0x1ec1/0x673d [ 2717.294577][ T5660] ? lock_downgrade+0x880/0x880 [ 2717.299445][ T5660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2717.305693][ T5660] ? kasan_check_read+0x11/0x20 [ 2717.310545][ T5660] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2717.317423][ T5660] ? avc_has_perm+0x404/0x610 [ 2717.322125][ T5660] ? __fget+0x35a/0x550 [ 2717.326303][ T5660] ? lock_downgrade+0x880/0x880 [ 2717.331168][ T5660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2717.338190][ T5660] ? sock_has_perm+0x209/0x2a0 [ 2717.342970][ T5660] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2717.349069][ T5660] ? kasan_check_write+0x14/0x20 [ 2717.354035][ T5660] sock_common_getsockopt+0x9a/0xe0 [ 2717.359243][ T5660] ? sock_common_getsockopt+0x9a/0xe0 [ 2717.364629][ T5660] __sys_getsockopt+0x168/0x250 [ 2717.369495][ T5660] ? kernel_setsockopt+0x1e0/0x1e0 [ 2717.374631][ T5660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2717.380107][ T5660] ? do_syscall_64+0x26/0x610 [ 2717.384797][ T5660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2717.390871][ T5660] ? do_syscall_64+0x26/0x610 [ 2717.395567][ T5660] __x64_sys_getsockopt+0xbe/0x150 [ 2717.400787][ T5660] do_syscall_64+0x103/0x610 [ 2717.405394][ T5660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2717.411341][ T5660] RIP: 0033:0x458209 [ 2717.415247][ T5660] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2717.434862][ T5660] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2717.443292][ T5660] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2717.451321][ T5660] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2717.459460][ T5660] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2717.467436][ T5660] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2717.475389][ T5660] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xc, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:18 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x900) 03:58:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xa00) 03:58:19 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x3f000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x1e00) 03:58:19 executing program 1 (fault-call:3 fault-nth:10): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2718.142418][ T5706] FAULT_INJECTION: forcing a failure. [ 2718.142418][ T5706] name failslab, interval 1, probability 0, space 0, times 0 03:58:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x2000) [ 2718.183149][ T5706] CPU: 0 PID: 5706 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2718.191098][ T5706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2718.201168][ T5706] Call Trace: [ 2718.204490][ T5706] dump_stack+0x172/0x1f0 [ 2718.208850][ T5706] should_fail.cold+0xa/0x15 [ 2718.213454][ T5706] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2718.219277][ T5706] ? ___might_sleep+0x163/0x280 [ 2718.224149][ T5706] __should_failslab+0x121/0x190 [ 2718.229096][ T5706] should_failslab+0x9/0x14 [ 2718.233602][ T5706] kmem_cache_alloc_trace+0x2d1/0x760 [ 2718.238988][ T5706] ? sctp_endpoint_lookup_assoc+0x290/0x290 [ 2718.244889][ T5706] sctp_auth_shkey_create+0x87/0x1b0 [ 2718.250180][ T5706] sctp_endpoint_new+0x518/0xed0 [ 2718.255124][ T5706] sctp_init_sock+0xc2e/0x1360 [ 2718.259887][ T5706] ? kasan_check_write+0x14/0x20 [ 2718.264819][ T5706] ? sock_init_data+0x8de/0xc70 [ 2718.269666][ T5706] ? sctp_destroy_sock+0x3e0/0x3e0 [ 2718.274780][ T5706] inet6_create+0x9cd/0xf90 [ 2718.279299][ T5706] __sock_create+0x3e6/0x750 [ 2718.283912][ T5706] sock_create+0x7f/0xa0 [ 2718.288170][ T5706] sctp_do_peeloff+0x1a0/0x470 [ 2718.292937][ T5706] ? sctp_copy_sock+0xe50/0xe50 [ 2718.297798][ T5706] ? lock_downgrade+0x880/0x880 [ 2718.302653][ T5706] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2718.310024][ T5706] ? sctp_do_peeloff+0x470/0x470 [ 2718.314986][ T5706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2718.321227][ T5706] ? _copy_from_user+0xdd/0x150 [ 2718.326086][ T5706] sctp_getsockopt+0x1ec1/0x673d [ 2718.331022][ T5706] ? lock_downgrade+0x880/0x880 [ 2718.335873][ T5706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.342119][ T5706] ? kasan_check_read+0x11/0x20 [ 2718.346983][ T5706] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2718.353833][ T5706] ? avc_has_perm+0x404/0x610 [ 2718.358539][ T5706] ? __fget+0x35a/0x550 [ 2718.362702][ T5706] ? lock_downgrade+0x880/0x880 [ 2718.367565][ T5706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2718.373811][ T5706] ? sock_has_perm+0x209/0x2a0 [ 2718.378577][ T5706] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2718.384659][ T5706] ? kasan_check_write+0x14/0x20 [ 2718.389613][ T5706] sock_common_getsockopt+0x9a/0xe0 [ 2718.394813][ T5706] ? sock_common_getsockopt+0x9a/0xe0 [ 2718.400186][ T5706] __sys_getsockopt+0x168/0x250 [ 2718.405211][ T5706] ? kernel_setsockopt+0x1e0/0x1e0 [ 2718.410326][ T5706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2718.415781][ T5706] ? do_syscall_64+0x26/0x610 [ 2718.420468][ T5706] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2718.426539][ T5706] ? do_syscall_64+0x26/0x610 [ 2718.431236][ T5706] __x64_sys_getsockopt+0xbe/0x150 [ 2718.436348][ T5706] do_syscall_64+0x103/0x610 [ 2718.440940][ T5706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2718.446831][ T5706] RIP: 0033:0x458209 [ 2718.450729][ T5706] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2718.470342][ T5706] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2718.478775][ T5706] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2718.486751][ T5706] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2718.494824][ T5706] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2718.502808][ T5706] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2718.510798][ T5706] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xd, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:19 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x2302) 03:58:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x3f00) 03:58:20 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x40000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:20 executing program 1 (fault-call:3 fault-nth:11): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x4800) 03:58:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2719.170090][ T5754] FAULT_INJECTION: forcing a failure. [ 2719.170090][ T5754] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.182875][ T5754] CPU: 0 PID: 5754 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2719.190780][ T5754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2719.201288][ T5754] Call Trace: [ 2719.204610][ T5754] dump_stack+0x172/0x1f0 [ 2719.208965][ T5754] should_fail.cold+0xa/0x15 [ 2719.213580][ T5754] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2719.219442][ T5754] ? kernel_text_address+0x73/0xf0 [ 2719.224576][ T5754] ? __kernel_text_address+0xd/0x40 [ 2719.229794][ T5754] __should_failslab+0x121/0x190 [ 2719.234747][ T5754] should_failslab+0x9/0x14 [ 2719.239261][ T5754] kmem_cache_alloc+0x47/0x6f0 [ 2719.244046][ T5754] ebitmap_cpy+0xcd/0x270 [ 2719.248382][ T5754] ? hashtab_search+0x1c2/0x250 [ 2719.253262][ T5754] mls_compute_sid+0x5d0/0xf80 [ 2719.258041][ T5754] ? mls_convert_context+0x6d0/0x6d0 [ 2719.263343][ T5754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.269599][ T5754] ? sidtab_search_core+0x164/0x210 [ 2719.274818][ T5754] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 2719.280594][ T5754] security_compute_sid.part.0+0xed5/0x1620 [ 2719.286481][ T5754] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 2719.293153][ T5754] ? __lock_acquire+0x548/0x3fb0 [ 2719.298121][ T5754] ? find_held_lock+0x35/0x130 [ 2719.302909][ T5754] ? __cgroup_bpf_run_filter_sk+0x2d6/0x580 [ 2719.308833][ T5754] security_transition_sid+0x126/0x190 [ 2719.314301][ T5754] selinux_socket_post_create+0x548/0x8a0 [ 2719.320022][ T5754] ? selinux_bprm_set_creds+0xcd0/0xcd0 [ 2719.325567][ T5754] ? __cgroup_bpf_run_filter_sk+0x307/0x580 [ 2719.331477][ T5754] ? sock_init_data+0x8de/0xc70 [ 2719.336349][ T5754] security_socket_post_create+0x89/0xd0 [ 2719.341987][ T5754] __sock_create+0x5cf/0x750 [ 2719.346581][ T5754] sock_create+0x7f/0xa0 [ 2719.350833][ T5754] sctp_do_peeloff+0x1a0/0x470 [ 2719.355590][ T5754] ? sctp_copy_sock+0xe50/0xe50 [ 2719.360461][ T5754] ? lock_downgrade+0x880/0x880 [ 2719.365327][ T5754] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2719.371918][ T5754] ? sctp_do_peeloff+0x470/0x470 [ 2719.376846][ T5754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2719.383097][ T5754] ? _copy_from_user+0xdd/0x150 [ 2719.387966][ T5754] sctp_getsockopt+0x1ec1/0x673d [ 2719.392895][ T5754] ? lock_downgrade+0x880/0x880 [ 2719.397749][ T5754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.403996][ T5754] ? kasan_check_read+0x11/0x20 [ 2719.408850][ T5754] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2719.415699][ T5754] ? avc_has_perm+0x404/0x610 [ 2719.420367][ T5754] ? __fget+0x35a/0x550 [ 2719.424516][ T5754] ? lock_downgrade+0x880/0x880 [ 2719.429364][ T5754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.435593][ T5754] ? sock_has_perm+0x209/0x2a0 [ 2719.440345][ T5754] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2719.446425][ T5754] ? kasan_check_write+0x14/0x20 [ 2719.451396][ T5754] sock_common_getsockopt+0x9a/0xe0 [ 2719.456610][ T5754] ? sock_common_getsockopt+0x9a/0xe0 [ 2719.462006][ T5754] __sys_getsockopt+0x168/0x250 [ 2719.466854][ T5754] ? kernel_setsockopt+0x1e0/0x1e0 [ 2719.471959][ T5754] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2719.477434][ T5754] ? do_syscall_64+0x26/0x610 [ 2719.482112][ T5754] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2719.488161][ T5754] ? do_syscall_64+0x26/0x610 [ 2719.492838][ T5754] __x64_sys_getsockopt+0xbe/0x150 [ 2719.497945][ T5754] do_syscall_64+0x103/0x610 [ 2719.502559][ T5754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2719.508483][ T5754] RIP: 0033:0x458209 [ 2719.512385][ T5754] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2719.532031][ T5754] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2719.540488][ T5754] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2719.548482][ T5754] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2719.556456][ T5754] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 03:58:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x4c00) [ 2719.564434][ T5754] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2719.572417][ T5754] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xe, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:21 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x5d00) 03:58:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x6800) 03:58:21 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0xa0010000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 03:58:21 executing program 1 (fault-call:3 fault-nth:12): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x6c00) [ 2720.130141][ T5795] FAULT_INJECTION: forcing a failure. [ 2720.130141][ T5795] name failslab, interval 1, probability 0, space 0, times 0 03:58:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 2720.185852][ T5795] CPU: 1 PID: 5795 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2720.193816][ T5795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2720.203933][ T5795] Call Trace: [ 2720.207262][ T5795] dump_stack+0x172/0x1f0 [ 2720.211631][ T5795] should_fail.cold+0xa/0x15 [ 2720.216264][ T5795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2720.222212][ T5795] ? ___might_sleep+0x163/0x280 [ 2720.227092][ T5795] __should_failslab+0x121/0x190 03:58:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 2720.232075][ T5795] should_failslab+0x9/0x14 [ 2720.236601][ T5795] kmem_cache_alloc_trace+0x2d1/0x760 [ 2720.242012][ T5795] ? sctp_endpoint_lookup_assoc+0x290/0x290 [ 2720.247942][ T5795] sctp_auth_shkey_create+0x87/0x1b0 [ 2720.253245][ T5795] sctp_endpoint_new+0x518/0xed0 [ 2720.258210][ T5795] sctp_init_sock+0xc2e/0x1360 [ 2720.262986][ T5795] ? kasan_check_write+0x14/0x20 [ 2720.267950][ T5795] ? sock_init_data+0x8de/0xc70 [ 2720.272809][ T5795] ? sctp_destroy_sock+0x3e0/0x3e0 [ 2720.277947][ T5795] inet6_create+0x9cd/0xf90 [ 2720.282473][ T5795] __sock_create+0x3e6/0x750 [ 2720.287086][ T5795] sock_create+0x7f/0xa0 [ 2720.291343][ T5795] sctp_do_peeloff+0x1a0/0x470 [ 2720.296122][ T5795] ? sctp_copy_sock+0xe50/0xe50 [ 2720.300989][ T5795] ? lock_downgrade+0x880/0x880 [ 2720.305862][ T5795] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2720.312465][ T5795] ? sctp_do_peeloff+0x470/0x470 [ 2720.317714][ T5795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2720.324057][ T5795] ? _copy_from_user+0xdd/0x150 [ 2720.328937][ T5795] sctp_getsockopt+0x1ec1/0x673d [ 2720.333889][ T5795] ? lock_downgrade+0x880/0x880 [ 2720.338758][ T5795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.345015][ T5795] ? kasan_check_read+0x11/0x20 [ 2720.349919][ T5795] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2720.356792][ T5795] ? avc_has_perm+0x404/0x610 [ 2720.361502][ T5795] ? __fget+0x35a/0x550 [ 2720.365685][ T5795] ? lock_downgrade+0x880/0x880 [ 2720.370554][ T5795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.376818][ T5795] ? sock_has_perm+0x209/0x2a0 [ 2720.381599][ T5795] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2720.387697][ T5795] ? kasan_check_write+0x14/0x20 [ 2720.392665][ T5795] sock_common_getsockopt+0x9a/0xe0 [ 2720.397881][ T5795] ? sock_common_getsockopt+0x9a/0xe0 [ 2720.403289][ T5795] __sys_getsockopt+0x168/0x250 [ 2720.408158][ T5795] ? kernel_setsockopt+0x1e0/0x1e0 [ 2720.413289][ T5795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2720.418761][ T5795] ? do_syscall_64+0x26/0x610 [ 2720.423479][ T5795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.429556][ T5795] ? do_syscall_64+0x26/0x610 [ 2720.434257][ T5795] __x64_sys_getsockopt+0xbe/0x150 [ 2720.439391][ T5795] do_syscall_64+0x103/0x610 [ 2720.444008][ T5795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.449905][ T5795] RIP: 0033:0x458209 [ 2720.453811][ T5795] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2720.473433][ T5795] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2720.473449][ T5795] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2720.473457][ T5795] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2720.473464][ T5795] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2720.473472][ T5795] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2720.473479][ T5795] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0xf, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:22 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200), 0x0, 0x0, 0x0) 03:58:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x7400) 03:58:22 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0xe0003f01) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200), 0x0, 0x0, 0x0) 03:58:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x7a00) 03:58:22 executing program 1 (fault-call:3 fault-nth:13): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:22 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200), 0x0, 0x0, 0x0) [ 2721.122804][ T5837] FAULT_INJECTION: forcing a failure. [ 2721.122804][ T5837] name failslab, interval 1, probability 0, space 0, times 0 [ 2721.135717][ T5837] CPU: 0 PID: 5837 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2721.143623][ T5837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2721.154326][ T5837] Call Trace: [ 2721.157639][ T5837] dump_stack+0x172/0x1f0 [ 2721.161995][ T5837] should_fail.cold+0xa/0x15 [ 2721.166611][ T5837] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2721.172461][ T5837] __should_failslab+0x121/0x190 [ 2721.177442][ T5837] should_failslab+0x9/0x14 [ 2721.181968][ T5837] kmem_cache_alloc+0x47/0x6f0 [ 2721.186761][ T5837] ebitmap_cpy+0xcd/0x270 [ 2721.191104][ T5837] ? hashtab_search+0x1c2/0x250 [ 2721.196608][ T5837] mls_compute_sid+0x5d0/0xf80 [ 2721.201393][ T5837] ? mls_convert_context+0x6d0/0x6d0 [ 2721.206731][ T5837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2721.213012][ T5837] ? sidtab_search_core+0x164/0x210 [ 2721.218407][ T5837] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 2721.224155][ T5837] security_compute_sid.part.0+0xed5/0x1620 [ 2721.230070][ T5837] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 2721.236763][ T5837] ? __lock_acquire+0x548/0x3fb0 [ 2721.241732][ T5837] ? find_held_lock+0x35/0x130 [ 2721.246514][ T5837] ? __cgroup_bpf_run_filter_sk+0x2d6/0x580 [ 2721.252453][ T5837] security_transition_sid+0x126/0x190 [ 2721.258018][ T5837] selinux_socket_post_create+0x548/0x8a0 [ 2721.263739][ T5837] ? selinux_bprm_set_creds+0xcd0/0xcd0 [ 2721.269307][ T5837] ? __cgroup_bpf_run_filter_sk+0x307/0x580 [ 2721.275210][ T5837] ? sock_init_data+0x8de/0xc70 [ 2721.280082][ T5837] security_socket_post_create+0x89/0xd0 [ 2721.285735][ T5837] __sock_create+0x5cf/0x750 [ 2721.290342][ T5837] sock_create+0x7f/0xa0 [ 2721.294605][ T5837] sctp_do_peeloff+0x1a0/0x470 [ 2721.299389][ T5837] ? sctp_copy_sock+0xe50/0xe50 [ 2721.304269][ T5837] ? lock_downgrade+0x880/0x880 [ 2721.309113][ T5837] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2721.315702][ T5837] ? sctp_do_peeloff+0x470/0x470 [ 2721.320656][ T5837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2721.326914][ T5837] ? _copy_from_user+0xdd/0x150 [ 2721.331870][ T5837] sctp_getsockopt+0x1ec1/0x673d [ 2721.336818][ T5837] ? lock_downgrade+0x880/0x880 [ 2721.341681][ T5837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2721.347929][ T5837] ? kasan_check_read+0x11/0x20 [ 2721.352780][ T5837] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2721.359634][ T5837] ? avc_has_perm+0x404/0x610 [ 2721.364342][ T5837] ? __fget+0x35a/0x550 [ 2721.368521][ T5837] ? lock_downgrade+0x880/0x880 [ 2721.373381][ T5837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2721.379660][ T5837] ? sock_has_perm+0x209/0x2a0 [ 2721.384454][ T5837] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2721.390544][ T5837] ? kasan_check_write+0x14/0x20 [ 2721.395495][ T5837] sock_common_getsockopt+0x9a/0xe0 [ 2721.400683][ T5837] ? sock_common_getsockopt+0x9a/0xe0 [ 2721.406041][ T5837] __sys_getsockopt+0x168/0x250 [ 2721.410879][ T5837] ? kernel_setsockopt+0x1e0/0x1e0 [ 2721.415991][ T5837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2721.421464][ T5837] ? do_syscall_64+0x26/0x610 [ 2721.426152][ T5837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2721.432235][ T5837] ? do_syscall_64+0x26/0x610 [ 2721.436920][ T5837] __x64_sys_getsockopt+0xbe/0x150 [ 2721.442035][ T5837] do_syscall_64+0x103/0x610 [ 2721.446631][ T5837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2721.452508][ T5837] RIP: 0033:0x458209 03:58:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x10, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xd000) [ 2721.456385][ T5837] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2721.475997][ T5837] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2721.484438][ T5837] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2721.492433][ T5837] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2721.500426][ T5837] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2721.508429][ T5837] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2721.516411][ T5837] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x2302) 03:58:23 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:23 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x1a0ffffffff) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xe306) 03:58:23 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:23 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:23 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x2770cb32585) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:23 executing program 1 (fault-call:3 fault-nth:14): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xfeff) 03:58:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2722.327119][ T5892] FAULT_INJECTION: forcing a failure. [ 2722.327119][ T5892] name failslab, interval 1, probability 0, space 0, times 0 [ 2722.344658][ T5892] CPU: 0 PID: 5892 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2722.352583][ T5892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2722.362656][ T5892] Call Trace: [ 2722.365970][ T5892] dump_stack+0x172/0x1f0 [ 2722.370325][ T5892] should_fail.cold+0xa/0x15 [ 2722.374943][ T5892] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2722.380766][ T5892] ? security_context_to_sid_core.isra.0+0x620/0x620 [ 2722.387463][ T5892] ? __lock_acquire+0x548/0x3fb0 [ 2722.392425][ T5892] __should_failslab+0x121/0x190 [ 2722.397354][ T5892] should_failslab+0x9/0x14 [ 2722.401867][ T5892] kmem_cache_alloc_trace+0x4b/0x760 [ 2722.407164][ T5892] ? find_held_lock+0x35/0x130 [ 2722.407191][ T5892] selinux_netlbl_sock_genattr+0xb3/0x430 [ 2722.407212][ T5892] selinux_netlbl_socket_post_create+0x7a/0x150 [ 2722.407235][ T5892] selinux_socket_post_create+0x49c/0x8a0 [ 2722.429659][ T5892] ? selinux_bprm_set_creds+0xcd0/0xcd0 [ 2722.435224][ T5892] ? __cgroup_bpf_run_filter_sk+0x307/0x580 [ 2722.441117][ T5892] ? sock_init_data+0x8de/0xc70 [ 2722.445960][ T5892] security_socket_post_create+0x89/0xd0 [ 2722.451582][ T5892] __sock_create+0x5cf/0x750 [ 2722.456160][ T5892] sock_create+0x7f/0xa0 [ 2722.460394][ T5892] sctp_do_peeloff+0x1a0/0x470 [ 2722.465188][ T5892] ? sctp_copy_sock+0xe50/0xe50 [ 2722.470039][ T5892] ? lock_downgrade+0x880/0x880 [ 2722.474903][ T5892] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2722.481497][ T5892] ? sctp_do_peeloff+0x470/0x470 [ 2722.486442][ T5892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2722.492666][ T5892] ? _copy_from_user+0xdd/0x150 [ 2722.497505][ T5892] sctp_getsockopt+0x1ec1/0x673d [ 2722.502445][ T5892] ? lock_downgrade+0x880/0x880 [ 2722.507295][ T5892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2722.513541][ T5892] ? kasan_check_read+0x11/0x20 [ 2722.518381][ T5892] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2722.525225][ T5892] ? avc_has_perm+0x404/0x610 [ 2722.529890][ T5892] ? __fget+0x35a/0x550 [ 2722.534051][ T5892] ? lock_downgrade+0x880/0x880 [ 2722.538898][ T5892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2722.545130][ T5892] ? sock_has_perm+0x209/0x2a0 [ 2722.549881][ T5892] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2722.555968][ T5892] ? kasan_check_write+0x14/0x20 [ 2722.560911][ T5892] sock_common_getsockopt+0x9a/0xe0 [ 2722.566100][ T5892] ? sock_common_getsockopt+0x9a/0xe0 [ 2722.571473][ T5892] __sys_getsockopt+0x168/0x250 [ 2722.576319][ T5892] ? kernel_setsockopt+0x1e0/0x1e0 [ 2722.581430][ T5892] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2722.586882][ T5892] ? do_syscall_64+0x26/0x610 [ 2722.591548][ T5892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2722.597641][ T5892] ? do_syscall_64+0x26/0x610 [ 2722.602326][ T5892] __x64_sys_getsockopt+0xbe/0x150 [ 2722.607447][ T5892] do_syscall_64+0x103/0x610 [ 2722.612038][ T5892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2722.617920][ T5892] RIP: 0033:0x458209 [ 2722.621802][ T5892] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2722.641419][ T5892] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2722.649858][ T5892] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2722.657858][ T5892] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2722.665827][ T5892] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 03:58:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x11, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0xfffe) 03:58:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x600) [ 2722.673803][ T5892] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2722.681766][ T5892] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:24 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x40000) 03:58:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x100000) 03:58:24 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x40030000000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:24 executing program 1 (fault-call:3 fault-nth:15): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x1000000) [ 2723.235177][ T5929] FAULT_INJECTION: forcing a failure. [ 2723.235177][ T5929] name failslab, interval 1, probability 0, space 0, times 0 [ 2723.248063][ T5929] CPU: 0 PID: 5929 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2723.256437][ T5929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2723.266614][ T5929] Call Trace: [ 2723.270073][ T5929] dump_stack+0x172/0x1f0 [ 2723.274486][ T5929] should_fail.cold+0xa/0x15 [ 2723.279226][ T5929] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2723.285156][ T5929] ? mark_held_locks+0xf0/0xf0 [ 2723.289947][ T5929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.296219][ T5929] __should_failslab+0x121/0x190 [ 2723.301274][ T5929] should_failslab+0x9/0x14 [ 2723.305810][ T5929] __kmalloc_track_caller+0x6d/0x740 [ 2723.311135][ T5929] ? security_netlbl_sid_to_secattr+0x18f/0x310 [ 2723.317457][ T5929] kstrdup+0x3a/0x70 [ 2723.321514][ T5929] security_netlbl_sid_to_secattr+0x18f/0x310 [ 2723.327788][ T5929] selinux_netlbl_sock_genattr+0xf3/0x430 [ 2723.333545][ T5929] selinux_netlbl_socket_post_create+0x7a/0x150 [ 2723.339817][ T5929] selinux_socket_post_create+0x49c/0x8a0 [ 2723.345567][ T5929] ? selinux_bprm_set_creds+0xcd0/0xcd0 [ 2723.351203][ T5929] ? __cgroup_bpf_run_filter_sk+0x307/0x580 [ 2723.357116][ T5929] ? sock_init_data+0x8de/0xc70 [ 2723.362089][ T5929] security_socket_post_create+0x89/0xd0 [ 2723.367818][ T5929] __sock_create+0x5cf/0x750 [ 2723.372458][ T5929] sock_create+0x7f/0xa0 [ 2723.376724][ T5929] sctp_do_peeloff+0x1a0/0x470 [ 2723.381674][ T5929] ? sctp_copy_sock+0xe50/0xe50 [ 2723.386547][ T5929] ? lock_downgrade+0x880/0x880 [ 2723.391710][ T5929] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2723.398488][ T5929] ? sctp_do_peeloff+0x470/0x470 [ 2723.403543][ T5929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2723.410002][ T5929] ? _copy_from_user+0xdd/0x150 [ 2723.414876][ T5929] sctp_getsockopt+0x1ec1/0x673d [ 2723.419827][ T5929] ? lock_downgrade+0x880/0x880 [ 2723.424781][ T5929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.431042][ T5929] ? kasan_check_read+0x11/0x20 [ 2723.435933][ T5929] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2723.442799][ T5929] ? avc_has_perm+0x404/0x610 [ 2723.447858][ T5929] ? __fget+0x35a/0x550 [ 2723.452035][ T5929] ? lock_downgrade+0x880/0x880 [ 2723.456900][ T5929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2723.463348][ T5929] ? sock_has_perm+0x209/0x2a0 [ 2723.468132][ T5929] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2723.474225][ T5929] ? kasan_check_write+0x14/0x20 [ 2723.479191][ T5929] sock_common_getsockopt+0x9a/0xe0 [ 2723.484442][ T5929] ? sock_common_getsockopt+0x9a/0xe0 [ 2723.489842][ T5929] __sys_getsockopt+0x168/0x250 [ 2723.494783][ T5929] ? kernel_setsockopt+0x1e0/0x1e0 [ 2723.499919][ T5929] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2723.505393][ T5929] ? do_syscall_64+0x26/0x610 [ 2723.510211][ T5929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2723.516296][ T5929] ? do_syscall_64+0x26/0x610 [ 2723.520999][ T5929] __x64_sys_getsockopt+0xbe/0x150 [ 2723.526131][ T5929] do_syscall_64+0x103/0x610 [ 2723.530886][ T5929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2723.536942][ T5929] RIP: 0033:0x458209 [ 2723.540853][ T5929] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2723.560648][ T5929] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2723.569162][ T5929] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2723.577214][ T5929] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 03:58:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2723.585199][ T5929] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2723.593179][ T5929] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2723.601162][ T5929] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 03:58:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x12, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:25 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) 03:58:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x2000000) 03:58:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x3000000) 03:58:25 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:25 executing program 1 (fault-call:3 fault-nth:16): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x4000000) [ 2724.119576][ T5968] FAULT_INJECTION: forcing a failure. [ 2724.119576][ T5968] name failslab, interval 1, probability 0, space 0, times 0 [ 2724.136073][ T5968] CPU: 1 PID: 5968 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2724.144016][ T5968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2724.154107][ T5968] Call Trace: [ 2724.157528][ T5968] dump_stack+0x172/0x1f0 [ 2724.162168][ T5968] should_fail.cold+0xa/0x15 [ 2724.166795][ T5968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2724.173268][ T5968] ? ___might_sleep+0x163/0x280 [ 2724.178241][ T5968] __should_failslab+0x121/0x190 [ 2724.183392][ T5968] should_failslab+0x9/0x14 [ 2724.187964][ T5968] kmem_cache_alloc_trace+0x2d1/0x760 [ 2724.193582][ T5968] ? mark_held_locks+0xa4/0xf0 [ 2724.198687][ T5968] sctp_add_bind_addr+0x9f/0x3a0 [ 2724.203738][ T5968] sctp_bind_addr_dup+0xdd/0x140 [ 2724.208792][ T5968] sctp_sock_migrate+0x525/0x14c0 [ 2724.214004][ T5968] ? kasan_check_read+0x11/0x20 [ 2724.218893][ T5968] sctp_do_peeloff+0x2f5/0x470 [ 2724.223697][ T5968] ? sctp_copy_sock+0xe50/0xe50 [ 2724.228595][ T5968] ? lock_downgrade+0x880/0x880 [ 2724.233575][ T5968] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2724.240383][ T5968] ? sctp_do_peeloff+0x470/0x470 [ 2724.245383][ T5968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2724.251696][ T5968] ? _copy_from_user+0xdd/0x150 [ 2724.256581][ T5968] sctp_getsockopt+0x1ec1/0x673d [ 2724.261967][ T5968] ? lock_downgrade+0x880/0x880 [ 2724.266928][ T5968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.273653][ T5968] ? kasan_check_read+0x11/0x20 [ 2724.278657][ T5968] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2724.285888][ T5968] ? avc_has_perm+0x404/0x610 [ 2724.290610][ T5968] ? __fget+0x35a/0x550 [ 2724.294808][ T5968] ? lock_downgrade+0x880/0x880 [ 2724.299687][ T5968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.306083][ T5968] ? sock_has_perm+0x209/0x2a0 [ 2724.310880][ T5968] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2724.317198][ T5968] ? kasan_check_write+0x14/0x20 [ 2724.322180][ T5968] sock_common_getsockopt+0x9a/0xe0 [ 2724.327448][ T5968] ? sock_common_getsockopt+0x9a/0xe0 [ 2724.332947][ T5968] __sys_getsockopt+0x168/0x250 [ 2724.337987][ T5968] ? kernel_setsockopt+0x1e0/0x1e0 [ 2724.343227][ T5968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2724.348720][ T5968] ? do_syscall_64+0x26/0x610 [ 2724.353456][ T5968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2724.359676][ T5968] ? do_syscall_64+0x26/0x610 [ 2724.364540][ T5968] __x64_sys_getsockopt+0xbe/0x150 [ 2724.369837][ T5968] do_syscall_64+0x103/0x610 [ 2724.374647][ T5968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2724.380578][ T5968] RIP: 0033:0x458209 [ 2724.384499][ T5968] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2724.405084][ T5968] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2724.413637][ T5968] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2724.421636][ T5968] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2724.429633][ T5968] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2724.437791][ T5968] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2724.446455][ T5968] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 [ 2724.497062][ T5968] kasan: CONFIG_KASAN_INLINE enabled [ 2724.503498][ T5968] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2724.516662][ T5968] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2724.523640][ T5968] CPU: 1 PID: 5968 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 2724.532164][ T5968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2724.542458][ T5968] RIP: 0010:sctp_assoc_rwnd_increase+0x34/0x520 [ 2724.549157][ T5968] Code: 41 54 49 89 fc 53 89 f3 48 83 ec 10 e8 a5 93 ee fa 49 8d bc 24 60 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 2f 04 00 00 45 8b ac 24 60 06 [ 2724.569259][ T5968] RSP: 0018:ffff8881f07ff6f8 EFLAGS: 00010203 [ 2724.575366][ T5968] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90008289000 [ 2724.583647][ T5968] RDX: 00000000000000cb RSI: ffffffff8681dddb RDI: 000000000000065f [ 2724.591722][ T5968] RBP: ffff8881f07ff730 R08: ffff8880563685c0 R09: ffff888056368e88 [ 2724.600266][ T5968] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffffffffff [ 2724.608541][ T5968] R13: 0000000000000000 R14: ffff88805573e840 R15: 0000000000000000 [ 2724.616953][ T5968] FS: 00007f7efa652700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2724.626381][ T5968] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2724.633488][ T5968] CR2: 000000000087c460 CR3: 000000020de89000 CR4: 00000000001406e0 [ 2724.642464][ T5968] Call Trace: [ 2724.645876][ T5968] sctp_ulpevent_free+0x21f/0x4e0 [ 2724.651661][ T5968] sctp_queue_purge_ulpevents+0xc4/0x110 [ 2724.657456][ T5968] sctp_close+0x148/0x860 [ 2724.661927][ T5968] ? rcu_read_lock_sched_held+0x110/0x130 [ 2724.668111][ T5968] ? mark_held_locks+0xa4/0xf0 [ 2724.673178][ T5968] ? sctp_init_sock+0x1360/0x1360 [ 2724.678636][ T5968] ? sctp_add_bind_addr+0x2d3/0x3a0 [ 2724.684273][ T5968] ? ip_mc_drop_socket+0x211/0x270 [ 2724.689597][ T5968] ? sctp_bind_addr_dup+0xf3/0x140 [ 2724.695300][ T5968] inet_release+0x105/0x1f0 [ 2724.700280][ T5968] inet6_release+0x53/0x80 [ 2724.704928][ T5968] __sock_release+0x1fe/0x2b0 [ 2724.709811][ T5968] sock_release+0x18/0x20 [ 2724.714652][ T5968] sctp_do_peeloff+0x38a/0x470 [ 2724.719652][ T5968] ? sctp_copy_sock+0xe50/0xe50 [ 2724.724551][ T5968] ? lock_downgrade+0x880/0x880 [ 2724.729774][ T5968] sctp_getsockopt_peeloff_common.isra.0+0x8e/0x270 [ 2724.736386][ T5968] ? sctp_do_peeloff+0x470/0x470 [ 2724.741826][ T5968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2724.748127][ T5968] ? _copy_from_user+0xdd/0x150 [ 2724.753516][ T5968] sctp_getsockopt+0x1ec1/0x673d [ 2724.758657][ T5968] ? lock_downgrade+0x880/0x880 [ 2724.764379][ T5968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.771065][ T5968] ? kasan_check_read+0x11/0x20 [ 2724.776559][ T5968] ? sctp_getsockopt_peeloff_common.isra.0+0x270/0x270 [ 2724.783717][ T5968] ? avc_has_perm+0x404/0x610 [ 2724.788820][ T5968] ? __fget+0x35a/0x550 [ 2724.793148][ T5968] ? lock_downgrade+0x880/0x880 [ 2724.798205][ T5968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2724.804846][ T5968] ? sock_has_perm+0x209/0x2a0 [ 2724.810300][ T5968] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 2724.816767][ T5968] ? kasan_check_write+0x14/0x20 [ 2724.822596][ T5968] sock_common_getsockopt+0x9a/0xe0 [ 2724.828521][ T5968] ? sock_common_getsockopt+0x9a/0xe0 [ 2724.833914][ T5968] __sys_getsockopt+0x168/0x250 [ 2724.838794][ T5968] ? kernel_setsockopt+0x1e0/0x1e0 [ 2724.844032][ T5968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2724.850194][ T5968] ? do_syscall_64+0x26/0x610 [ 2724.855799][ T5968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2724.862323][ T5968] ? do_syscall_64+0x26/0x610 [ 2724.867041][ T5968] __x64_sys_getsockopt+0xbe/0x150 [ 2724.873321][ T5968] do_syscall_64+0x103/0x610 [ 2724.878830][ T5968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2724.886203][ T5968] RIP: 0033:0x458209 [ 2724.890621][ T5968] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2724.913498][ T5968] RSP: 002b:00007f7efa651c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2724.923311][ T5968] RAX: ffffffffffffffda RBX: 00007f7efa651c90 RCX: 0000000000458209 [ 2724.932619][ T5968] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 2724.942155][ T5968] RBP: 000000000073bfa0 R08: 000000002095c000 R09: 0000000000000000 [ 2724.952119][ T5968] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f7efa6526d4 [ 2724.961015][ T5968] R13: 00000000004c9ad8 R14: 00000000004d0538 R15: 0000000000000004 [ 2724.971316][ T5968] Modules linked in: [ 2724.979734][ T5968] ---[ end trace 28750efab6f5196e ]--- [ 2724.991125][ T5968] RIP: 0010:sctp_assoc_rwnd_increase+0x34/0x520 03:58:26 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x100000000000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x54b3, 0xffffffffc222a068}) 03:58:26 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) 03:58:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x5000000) 03:58:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x100000001}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000180)=0xf860) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x13, &(0x7f0000000140)={r1}, &(0x7f000095c000)=0x20000148) 03:58:26 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) exit(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x204040, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x1c) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0xf2, 0x0, 0xffffffff, 0x0, 0xffffffffc222a068}) [ 2724.998166][ T5968] Code: 41 54 49 89 fc 53 89 f3 48 83 ec 10 e8 a5 93 ee fa 49 8d bc 24 60 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 2f 04 00 00 45 8b ac 24 60 06 [ 2725.025690][ T5968] RSP: 0018:ffff8881f07ff6f8 EFLAGS: 00010203 [ 2725.032913][ T5968] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90008289000 [ 2725.042896][ T5968] RDX: 00000000000000cb RSI: ffffffff8681dddb RDI: 000000000000065f [ 2725.076341][ T5968] RBP: ffff8881f07ff730 R08: ffff8880563685c0 R09: ffff888056368e88 [ 2725.107378][ T5968] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffffffffff 03:58:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') read$eventfd(r1, 0x0, 0x6000000) [ 2725.140983][ T5968] R13: 0000000000000000 R14: ffff88805573e840 R15: 0000000000000000 [ 2725.152721][ T3876] kobject: 'loop5' (00000000be6a2156): kobject_uevent_env [ 2725.168888][ T3876] kobject: 'loop5' (00000000be6a2156): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:58:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000009200)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) [ 2725.188755][ T5968] FS: 00007f7efa652700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2725.201782][ T5968] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2725.212766][ T5968] CR2: 0000001b2d623000 CR3: 000000020de89000 CR4: 00000000001406e0 [ 2725.223957][ T5968] Kernel panic - not syncing: Fatal exception [ 2725.232487][ T5968] Kernel Offset: disabled [ 2725.237595][ T5968] Rebooting in 86400 seconds..