) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) r3 = socket(0x2, 0x1, 0x2) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000340)={0x2b8, 0x7, 0x6, 0x9}) r5 = accept$inet(r3, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0xfe}, 0x98) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x40005fea, 0xffffffffffffffff) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) rename(&(0x7f0000000100)='./file0\x00', 0x0) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x40005fea, 0xffffffffffffffff) (async) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) r3 = socket(0x2, 0x1, 0x2) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000340)={0x2b8, 0x7, 0x6, 0x9}) r5 = accept$inet(r3, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0xfe}, 0x98) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r4) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x40, r4) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x40005fea, 0xffffffffffffffff) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x40005fea, 0xffffffffffffffff) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) dup2(r1, r0) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) (async) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r4) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x40, r4) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) r3 = socket(0x2, 0x1, 0x2) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000340)={0x2b8, 0x7, 0x6, 0x9}) accept$inet(r3, 0x0, &(0x7f0000000240)) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @rand_addr=0x2}}}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x0, 0x6, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r4) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x40, r4) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @rand_addr=0x2}}}, 0x98) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x0, 0x6, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) socket(0x2, 0x1, 0x2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000340)={0x2b8, 0x7, 0x6, 0x9}) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @rand_addr=0x2}}}, 0x98) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) dup2(r2, r1) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @rand_addr=0x2}}}, 0x98) (async) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r4) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x40, r4) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x0, 0x6, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x7fffffff, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ff}}, 0x0, 0x0, 0x1}, 0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x2c) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r4) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) socket(0x2, 0x1, 0x2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x0, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) socket(0x2, 0x1, 0x2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) getpid() connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x7fffffff, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ff}}, 0x0, 0x0, 0x1}, 0x98) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x2c) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x0, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x7fffffff, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ff}}, 0x0, 0x0, 0x1}, 0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x2c) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) dup2(r2, r1) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x7fffffff, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ff}}, 0x0, 0x0, 0x1}, 0x98) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x2c) (async) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) socket(0x2, 0x1, 0x2) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x0, 0xfffffffc, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) socket(0x2, 0x1, 0x2) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:46 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) socket(0x2, 0x1, 0x2) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:46 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0x0, 0xfffd, 0xff}, 0x98) 00:06:46 executing program 3: r0 = socket(0x17, 0x1, 0x3) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) r4 = socket$inet6(0x1c, 0x4, 0x8) setsockopt$inet6_sctp_SCTP_RTOINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7, 0x5, 0xe8b}, 0x10) dup2(r2, r3) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @multicast1}}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, r7, 0x0, 0xd6}, 0x98) 00:06:46 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0x0, 0xfffd, 0xff}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 3: r0 = socket(0x17, 0x1, 0x3) (async) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r1 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) (async) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) r4 = socket$inet6(0x1c, 0x4, 0x8) setsockopt$inet6_sctp_SCTP_RTOINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7, 0x5, 0xe8b}, 0x10) dup2(r2, r3) (async) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @multicast1}}]}, &(0x7f0000000180)=0x10) (async) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) (async) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, r7, 0x0, 0xd6}, 0x98) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0x0, 0xfffd, 0xff}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 3: r0 = socket(0x17, 0x1, 0x3) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) r4 = socket$inet6(0x1c, 0x4, 0x8) setsockopt$inet6_sctp_SCTP_RTOINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7, 0x5, 0xe8b}, 0x10) dup2(r2, r3) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @multicast1}}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, r7, 0x0, 0xd6}, 0x98) socket(0x17, 0x1, 0x3) (async) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) (async) socket$inet6(0x1c, 0x4, 0x8) (async) setsockopt$inet6_sctp_SCTP_RTOINFO(r4, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7, 0x5, 0xe8b}, 0x10) (async) dup2(r2, r3) (async) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @multicast1}}]}, &(0x7f0000000180)=0x10) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) (async) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, r7, 0x0, 0xd6}, 0x98) (async) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0x0, 0xff}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0x0, 0xff}, 0x98) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x1, 0x3402, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400004402c4, 0x20) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x9, @ipv4, 0xfffffffb}}, 0x0, 0x400000}, 0x98) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0x0, 0xff}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) ktrace(&(0x7f0000000380)='./file1\x00', 0x4, 0x24c, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400004402c4, 0x20) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x9, @ipv4, 0xfffffffb}}, 0x0, 0x400000}, 0x98) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0xfffd}, 0x98) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400004402c4, 0x20) (async) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x9, @ipv4, 0xfffffffb}}, 0x0, 0x400000}, 0x98) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getpid() dup2(r1, r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2000000, 0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0xfffd}, 0x98) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) (async) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) (async, rerun: 64) getpid() (rerun: 64) dup2(r1, r0) (async) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2000000, 0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) (async) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) (async) getpid() dup2(r1, r0) (async) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2000000, 0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000100)="749a2c94631efadf35278f213446e0c5cb0aec742fadd420cabf76fc68cca4b7ea0a5662cf0d6f76a664710294263d9895e85cbaab03289efd3d8b25d96072cf51967016ebf6c3e7e8467e42a2b9558ac4969de14c519bdeb1d358d5cb5392f22bf4821604bb3cd31ade0e5720c73f0a323bd584493ae47444c09c9855dd72677e28dc576ca9012d4cfef1acb35802c08fb7a200c70a58baed95138520736c8357e509aa1e2b515e38493fd7bf089cd832633a4e5ba339fede8388d8723da3995cf1f23731aeeb69088b8aa5ea2a56a1a9104436902aca3ea516607062", 0xdd}, {&(0x7f0000000200)="589b920617289b56ea970e0a3d43c18e728306098f05aea33cffae9de181d017e07f588cf92405e2a4b17b38a7ba7c0df34fc741d391", 0x36}, {&(0x7f0000000340)}], 0x3, 0x0, 0x0, 0x20000}, 0x20001) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x2, 0x0, @empty, 0x9d}}, 0x0, 0x0, 0x6, 0x6, 0xfffffffc, 0xfffd}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) r3 = dup2(r2, r1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) r5 = dup(r4) ioctl$DIOCGETSTATES(r5, 0xc0104419, &(0x7f0000000540)) sendmsg$unix(r5, &(0x7f0000001580)={&(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000001500)=[{&(0x7f0000000140)="a7da589fa73773da2690a63d9c6c39cda20fe2c9af6b5be2e80b5346664adcef56e1b57d7fab8303b2209e223d56716f958f13b2c85a856581bf24530dd3f58f09a2cb235293afc73d534bff7b60a1afc0110493fa7a8be8377388aff098752585653d2c6b00b914ebe31a9ec48c4ff8a5", 0x71}, {&(0x7f0000000340)="f6a379e972d1676d3b8cb2c7d809d1e7e304601cb10a898372f2d9a8fa5a2ce15cc27de5a356f3eaf1532b5bbbaca62a2b8c0bf7aec9571d0147dde88fb82b72ac18601ee28ce26679423d14ec0c115893858b819668f05bde55703721e73403e0cdca6698004af140eb4f3601d7e0d3b8e12fab7e1b3c32f0e6bfb54176c6b6725b02d8b48709d485e1f86ea8dca01f345041d9e95af68de540368d411e127cbf818830129434f07e55be6ce8302a4ee942efd2ae386dc08d22b5ad705644c7599e7ac0ac135fba", 0xc8}, {&(0x7f00000001c0)="d23a759e3e60b1e1fcae2376dca381d9dab5f5a2bed91aee89f398a44be20a09159f856c6ad7c3e69d95171558fd928d1d6fd7f039f20839be65adb22721bb6b79c0e738c8d2867abb835170ef531f91feeb058b5ba5f8701665305de7730fc2b953dea2315e97927b539595378c6b9d73d3688d8feaa84dd70e244246f756a6c8e104a2871d95df282bebe380832bde5e32879febaeafd23e8044128c867669c1ac5add11b32936b48e", 0xaa}, {&(0x7f0000000440)="10f4868084d3d18c409b68b7f2faf8ec3a3024c8e6e74d89e2ebba452de4114d92ff", 0x22}, {&(0x7f0000000480)="b6d58c688982b2728ee3308f89d62e5b0e7751c65ceef3242645db58228f7f866d0d21f6462ffec7b407205e0b78ffc0835efb3d9c6e90a8bfc8b5084b8cfd18fb169c80274d0cc8e868b81418f281b40e954af64cf5", 0x56}, {&(0x7f0000000500)="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", 0x1000}], 0x6, 0x0, 0x0, 0x4}, 0x5) fcntl$getflags(r1, 0x3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) dup2(r2, r1) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) (async) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) r3 = dup2(r2, r1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) r5 = dup(r4) ioctl$DIOCGETSTATES(r5, 0xc0104419, &(0x7f0000000540)) sendmsg$unix(r5, &(0x7f0000001580)={&(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000001500)=[{&(0x7f0000000140)="a7da589fa73773da2690a63d9c6c39cda20fe2c9af6b5be2e80b5346664adcef56e1b57d7fab8303b2209e223d56716f958f13b2c85a856581bf24530dd3f58f09a2cb235293afc73d534bff7b60a1afc0110493fa7a8be8377388aff098752585653d2c6b00b914ebe31a9ec48c4ff8a5", 0x71}, {&(0x7f0000000340)="f6a379e972d1676d3b8cb2c7d809d1e7e304601cb10a898372f2d9a8fa5a2ce15cc27de5a356f3eaf1532b5bbbaca62a2b8c0bf7aec9571d0147dde88fb82b72ac18601ee28ce26679423d14ec0c115893858b819668f05bde55703721e73403e0cdca6698004af140eb4f3601d7e0d3b8e12fab7e1b3c32f0e6bfb54176c6b6725b02d8b48709d485e1f86ea8dca01f345041d9e95af68de540368d411e127cbf818830129434f07e55be6ce8302a4ee942efd2ae386dc08d22b5ad705644c7599e7ac0ac135fba", 0xc8}, {&(0x7f00000001c0)="d23a759e3e60b1e1fcae2376dca381d9dab5f5a2bed91aee89f398a44be20a09159f856c6ad7c3e69d95171558fd928d1d6fd7f039f20839be65adb22721bb6b79c0e738c8d2867abb835170ef531f91feeb058b5ba5f8701665305de7730fc2b953dea2315e97927b539595378c6b9d73d3688d8feaa84dd70e244246f756a6c8e104a2871d95df282bebe380832bde5e32879febaeafd23e8044128c867669c1ac5add11b32936b48e", 0xaa}, {&(0x7f0000000440)="10f4868084d3d18c409b68b7f2faf8ec3a3024c8e6e74d89e2ebba452de4114d92ff", 0x22}, {&(0x7f0000000480)="b6d58c688982b2728ee3308f89d62e5b0e7751c65ceef3242645db58228f7f866d0d21f6462ffec7b407205e0b78ffc0835efb3d9c6e90a8bfc8b5084b8cfd18fb169c80274d0cc8e868b81418f281b40e954af64cf5", 0x56}, {&(0x7f0000000500)="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", 0x1000}], 0x6, 0x0, 0x0, 0x4}, 0x5) fcntl$getflags(r1, 0x3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) dup2(r2, r1) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) (async) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) getpid() sysarch$I386_SET_PKRU(0xc, &(0x7f0000000080)={0x2, 0x5d, 0x10000, 0x2}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) r3 = dup2(r2, r1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) r5 = dup(r4) ioctl$DIOCGETSTATES(r5, 0xc0104419, &(0x7f0000000540)) sendmsg$unix(r5, &(0x7f0000001580)={&(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000001500)=[{&(0x7f0000000140)="a7da589fa73773da2690a63d9c6c39cda20fe2c9af6b5be2e80b5346664adcef56e1b57d7fab8303b2209e223d56716f958f13b2c85a856581bf24530dd3f58f09a2cb235293afc73d534bff7b60a1afc0110493fa7a8be8377388aff098752585653d2c6b00b914ebe31a9ec48c4ff8a5", 0x71}, {&(0x7f0000000340)="f6a379e972d1676d3b8cb2c7d809d1e7e304601cb10a898372f2d9a8fa5a2ce15cc27de5a356f3eaf1532b5bbbaca62a2b8c0bf7aec9571d0147dde88fb82b72ac18601ee28ce26679423d14ec0c115893858b819668f05bde55703721e73403e0cdca6698004af140eb4f3601d7e0d3b8e12fab7e1b3c32f0e6bfb54176c6b6725b02d8b48709d485e1f86ea8dca01f345041d9e95af68de540368d411e127cbf818830129434f07e55be6ce8302a4ee942efd2ae386dc08d22b5ad705644c7599e7ac0ac135fba", 0xc8}, {&(0x7f00000001c0)="d23a759e3e60b1e1fcae2376dca381d9dab5f5a2bed91aee89f398a44be20a09159f856c6ad7c3e69d95171558fd928d1d6fd7f039f20839be65adb22721bb6b79c0e738c8d2867abb835170ef531f91feeb058b5ba5f8701665305de7730fc2b953dea2315e97927b539595378c6b9d73d3688d8feaa84dd70e244246f756a6c8e104a2871d95df282bebe380832bde5e32879febaeafd23e8044128c867669c1ac5add11b32936b48e", 0xaa}, {&(0x7f0000000440)="10f4868084d3d18c409b68b7f2faf8ec3a3024c8e6e74d89e2ebba452de4114d92ff", 0x22}, {&(0x7f0000000480)="b6d58c688982b2728ee3308f89d62e5b0e7751c65ceef3242645db58228f7f866d0d21f6462ffec7b407205e0b78ffc0835efb3d9c6e90a8bfc8b5084b8cfd18fb169c80274d0cc8e868b81418f281b40e954af64cf5", 0x56}, {&(0x7f0000000500)="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", 0x1000}], 0x6, 0x0, 0x0, 0x4}, 0x5) fcntl$getflags(r1, 0x3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() r2 = vfork() ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x808, r2) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) socket$inet6_icmp(0x1c, 0x2, 0x3a) r4 = dup(r0) __specialfd$eventfd(0x1, &(0x7f0000000080)={0x3, 0x5}, 0x8) r5 = dup2(r4, r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:47 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) r4 = dup(r3) ioctl$DIOCGETSTATES(r4, 0xc0104419, &(0x7f0000000540)) sendmsg$unix(r4, &(0x7f0000001580)={&(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000001500)=[{&(0x7f0000000140)="a7da589fa73773da2690a63d9c6c39cda20fe2c9af6b5be2e80b5346664adcef56e1b57d7fab8303b2209e223d56716f958f13b2c85a856581bf24530dd3f58f09a2cb235293afc73d534bff7b60a1afc0110493fa7a8be8377388aff098752585653d2c6b00b914ebe31a9ec48c4ff8a5", 0x71}, {&(0x7f0000000340)="f6a379e972d1676d3b8cb2c7d809d1e7e304601cb10a898372f2d9a8fa5a2ce15cc27de5a356f3eaf1532b5bbbaca62a2b8c0bf7aec9571d0147dde88fb82b72ac18601ee28ce26679423d14ec0c115893858b819668f05bde55703721e73403e0cdca6698004af140eb4f3601d7e0d3b8e12fab7e1b3c32f0e6bfb54176c6b6725b02d8b48709d485e1f86ea8dca01f345041d9e95af68de540368d411e127cbf818830129434f07e55be6ce8302a4ee942efd2ae386dc08d22b5ad705644c7599e7ac0ac135fba", 0xc8}, {&(0x7f00000001c0)="d23a759e3e60b1e1fcae2376dca381d9dab5f5a2bed91aee89f398a44be20a09159f856c6ad7c3e69d95171558fd928d1d6fd7f039f20839be65adb22721bb6b79c0e738c8d2867abb835170ef531f91feeb058b5ba5f8701665305de7730fc2b953dea2315e97927b539595378c6b9d73d3688d8feaa84dd70e244246f756a6c8e104a2871d95df282bebe380832bde5e32879febaeafd23e8044128c867669c1ac5add11b32936b48e", 0xaa}, {&(0x7f0000000440)="10f4868084d3d18c409b68b7f2faf8ec3a3024c8e6e74d89e2ebba452de4114d92ff", 0x22}, {&(0x7f0000000480)="b6d58c688982b2728ee3308f89d62e5b0e7751c65ceef3242645db58228f7f866d0d21f6462ffec7b407205e0b78ffc0835efb3d9c6e90a8bfc8b5084b8cfd18fb169c80274d0cc8e868b81418f281b40e954af64cf5", 0x56}, {&(0x7f0000000500)="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", 0x1000}], 0x6, 0x0, 0x0, 0x4}, 0x5) fcntl$getflags(r1, 0x3) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:47 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:47 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) r4 = dup(r3) ioctl$DIOCGETSTATES(r4, 0xc0104419, &(0x7f0000000540)) sendmsg$unix(r4, &(0x7f0000001580)={&(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000001500)=[{&(0x7f0000000140)="a7da589fa73773da2690a63d9c6c39cda20fe2c9af6b5be2e80b5346664adcef56e1b57d7fab8303b2209e223d56716f958f13b2c85a856581bf24530dd3f58f09a2cb235293afc73d534bff7b60a1afc0110493fa7a8be8377388aff098752585653d2c6b00b914ebe31a9ec48c4ff8a5", 0x71}, {&(0x7f0000000340)="f6a379e972d1676d3b8cb2c7d809d1e7e304601cb10a898372f2d9a8fa5a2ce15cc27de5a356f3eaf1532b5bbbaca62a2b8c0bf7aec9571d0147dde88fb82b72ac18601ee28ce26679423d14ec0c115893858b819668f05bde55703721e73403e0cdca6698004af140eb4f3601d7e0d3b8e12fab7e1b3c32f0e6bfb54176c6b6725b02d8b48709d485e1f86ea8dca01f345041d9e95af68de540368d411e127cbf818830129434f07e55be6ce8302a4ee942efd2ae386dc08d22b5ad705644c7599e7ac0ac135fba", 0xc8}, {&(0x7f00000001c0)="d23a759e3e60b1e1fcae2376dca381d9dab5f5a2bed91aee89f398a44be20a09159f856c6ad7c3e69d95171558fd928d1d6fd7f039f20839be65adb22721bb6b79c0e738c8d2867abb835170ef531f91feeb058b5ba5f8701665305de7730fc2b953dea2315e97927b539595378c6b9d73d3688d8feaa84dd70e244246f756a6c8e104a2871d95df282bebe380832bde5e32879febaeafd23e8044128c867669c1ac5add11b32936b48e", 0xaa}, {&(0x7f0000000440)="10f4868084d3d18c409b68b7f2faf8ec3a3024c8e6e74d89e2ebba452de4114d92ff", 0x22}, {&(0x7f0000000480)="b6d58c688982b2728ee3308f89d62e5b0e7751c65ceef3242645db58228f7f866d0d21f6462ffec7b407205e0b78ffc0835efb3d9c6e90a8bfc8b5084b8cfd18fb169c80274d0cc8e868b81418f281b40e954af64cf5", 0x56}, {&(0x7f0000000500)="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", 0x1000}], 0x6, 0x0, 0x0, 0x4}, 0x5) 00:06:47 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:48 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() r2 = vfork() ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x808, r2) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) socket$inet6_icmp(0x1c, 0x2, 0x3a) r4 = dup(r0) __specialfd$eventfd(0x1, &(0x7f0000000080)={0x3, 0x5}, 0x8) r5 = dup2(r4, r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) vfork() (async) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x808, r2) (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) socket$inet6_icmp(0x1c, 0x2, 0x3a) (async) dup(r0) (async) __specialfd$eventfd(0x1, &(0x7f0000000080)={0x3, 0x5}, 0x8) (async) dup2(r4, r3) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) (async) 00:06:48 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:48 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) r4 = dup(r3) ioctl$DIOCGETSTATES(r4, 0xc0104419, &(0x7f0000000540)) 00:06:48 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:48 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000040)={0xfffffffb, 0x1850, 0x6, 0x40}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:48 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:48 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:48 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) dup(r3) 00:06:49 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:49 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:49 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) freebsd11_statfs(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) 00:06:49 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r1 = getpid() r2 = vfork() ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x808, r2) (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r1) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) (async) socket$inet6_icmp(0x1c, 0x2, 0x3a) (async) r4 = dup(r0) __specialfd$eventfd(0x1, &(0x7f0000000080)={0x3, 0x5}, 0x8) (async) r5 = dup2(r4, r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:50 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:50 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_read(&(0x7f0000001700)={r1, 0x2, &(0x7f00000015c0)="b10b380429acf3ac44039528395b2f71b39397f7ae21d7071314114af6ee02a958e493aaac4d4c700b6dd2165a1fd7a93e6e63e841b10c063504d3a8a0b2df45148dcd0a53d7116c37522c34e97fb001d83870a0e6f7820b3bbd2d3120a9bb43a2cd50cde4003f907910b0225e6a6d80c2a95ed509a5a987b8eae1620247b0d6cbb6e71d47ba667dc7", 0x89, [0x7fffffff, 0x1], 0x9, 0x20, 0xa3ac, {0x52, 0x4, &(0x7f0000001680)="2393b65d904b75c61a6464383f64d299da248d36a20479dc92a82589a9ed40446fc9548c7827db7b925649d0c5042608ac582dd2281c7f3fa1abf06920e366f412c426c490b2e146e7f3318c50"}, {0x3, 0x13, @sigval_ptr=0x6, @spare=[0x0, 0xb4, 0x3, 0xd9dd, 0x9b2, 0x5, 0x91, 0x73cb]}}) 00:06:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:50 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 00:06:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:50 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:50 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) dup2(r2, r1) 00:06:50 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x1, 0x9, @empty, 0x8}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async, rerun: 32) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async, rerun: 32) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") (async) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) (async) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) (async) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) (async) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x1, 0x9, @empty, 0x8}, 0x1c) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") (async) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) (async) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) (async) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) (async) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x1, 0x9, @empty, 0x8}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup(r1) ioctl$DIOCGETSTATES(r2, 0xc0104419, &(0x7f0000000540)) accept$unix(r2, &(0x7f0000000040)=@abs={0x8}, &(0x7f0000000080)=0x8) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r4, r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=0xff, 0x4) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup(r1) ioctl$DIOCGETSTATES(r2, 0xc0104419, &(0x7f0000000540)) accept$unix(r2, &(0x7f0000000040)=@abs={0x8}, &(0x7f0000000080)=0x8) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async, rerun: 64) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) (rerun: 64) r5 = dup2(r4, r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup(r1) ioctl$DIOCGETSTATES(r2, 0xc0104419, &(0x7f0000000540)) accept$unix(r2, &(0x7f0000000040)=@abs={0x8}, &(0x7f0000000080)=0x8) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r4, r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) dup(r1) (async) ioctl$DIOCGETSTATES(r2, 0xc0104419, &(0x7f0000000540)) (async) accept$unix(r2, &(0x7f0000000040)=@abs={0x8}, &(0x7f0000000080)=0x8) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) dup2(r4, r3) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) (async) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) procctl$PROC_REAP_STATUS(0x0, r0, 0x4, &(0x7f0000000200)) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) r4 = accept$inet6(r2, 0x0, &(0x7f0000000040)) aio_cancel(r4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)="7a0a883778747eec97c3dc02147eecb836", 0x11, [0x40, 0x7], 0x6, 0x20, 0x4, {0x7f, 0xed, &(0x7f0000000100)="9203bc7859d8aeb6a4722506266489045971ebb3"}, {0x1, 0x1a, @sival_ptr=0x8, @spare=[0x40, 0x8000000000000001, 0x6e, 0x5, 0x400, 0x70, 0xc46, 0x7fffffffffffffff]}}) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) procctl$PROC_REAP_STATUS(0x0, r0, 0x4, &(0x7f0000000200)) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) r4 = accept$inet6(r2, 0x0, &(0x7f0000000040)) aio_cancel(r4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)="7a0a883778747eec97c3dc02147eecb836", 0x11, [0x40, 0x7], 0x6, 0x20, 0x4, {0x7f, 0xed, &(0x7f0000000100)="9203bc7859d8aeb6a4722506266489045971ebb3"}, {0x1, 0x1a, @sival_ptr=0x8, @spare=[0x40, 0x8000000000000001, 0x6e, 0x5, 0x400, 0x70, 0xc46, 0x7fffffffffffffff]}}) sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) getpid() (async) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) procctl$PROC_REAP_STATUS(0x0, r0, 0x4, &(0x7f0000000200)) (async) dup2(r2, r1) (async) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) (async) accept$inet6(r2, 0x0, &(0x7f0000000040)) (async) aio_cancel(r4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)="7a0a883778747eec97c3dc02147eecb836", 0x11, [0x40, 0x7], 0x6, 0x20, 0x4, {0x7f, 0xed, &(0x7f0000000100)="9203bc7859d8aeb6a4722506266489045971ebb3"}, {0x1, 0x1a, @sival_ptr=0x8, @spare=[0x40, 0x8000000000000001, 0x6e, 0x5, 0x400, 0x70, 0xc46, 0x7fffffffffffffff]}}) (async) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) procctl$PROC_REAP_STATUS(0x0, r0, 0x4, &(0x7f0000000200)) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) r4 = accept$inet6(r2, 0x0, &(0x7f0000000040)) aio_cancel(r4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080)="7a0a883778747eec97c3dc02147eecb836", 0x11, [0x40, 0x7], 0x6, 0x20, 0x4, {0x7f, 0xed, &(0x7f0000000100)="9203bc7859d8aeb6a4722506266489045971ebb3"}, {0x1, 0x1a, @sival_ptr=0x8, @spare=[0x40, 0x8000000000000001, 0x6e, 0x5, 0x400, 0x70, 0xc46, 0x7fffffffffffffff]}}) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000100)={0x8000, 0x5, 0x89, 0xfffffff9}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = getpid() sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000140)={0xffff, 0x80, 0x7, 0x100000}) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r1) ktrace(&(0x7f0000000040)='./file1\x00', 0x0, 0x0, r1) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r2) r5 = dup2(r3, r4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x1, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}}, 0x0, 0x4}, 0x98) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000100)={0x8000, 0x5, 0x89, 0xfffffff9}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = getpid() sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000140)={0xffff, 0x80, 0x7, 0x100000}) (async) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r1) (async) ktrace(&(0x7f0000000040)='./file1\x00', 0x0, 0x0, r1) (async) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) (async) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r2) r5 = dup2(r3, r4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x1, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}}, 0x0, 0x4}, 0x98) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) (async) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000100)={0x8000, 0x5, 0x89, 0xfffffff9}) (async) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) (async, rerun: 64) r0 = getpid() (rerun: 64) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) (async) r1 = getpid() sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000140)={0xffff, 0x80, 0x7, 0x100000}) (async, rerun: 64) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x14, r1) (async, rerun: 64) ktrace(&(0x7f0000000040)='./file1\x00', 0x0, 0x0, r1) (async) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r2) r5 = dup2(r3, r4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x1, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}}, 0x0, 0x4}, 0x98) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x1, 0x9, @empty, 0x8}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x1, 0x9, @empty, 0x8}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x1, 0x9, @empty, 0x8}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_TRACE_CTL(0x2, r0, 0x7, &(0x7f0000000040)=0x7) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:51 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:51 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:51 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:51 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000080)=0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000080)=0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000080)=0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = semget(0x3, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000080)=0x0) r3 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:52 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) semget(0x3, 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:52 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:52 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(0xffffffffffffffff, r1) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(0xffffffffffffffff, r1) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000000)="cd5c6b8b8dcc0c86699d768d9145d3508d63ffd45a4599b71bdfc4f6aadaae3b301932af2b4805cf5e1d42b1b55cbd542230a2867cc0fe17bb7c34ca9034c3cf101c03e359db7fc4667f8a09e63221735883218779568208a7a27e6947ddd94a939dc80a1a467e68067c2fd3081eca8f222c4e9b31b52ac14b22bc070f93a0fe1ab86d") r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(0xffffffffffffffff, r1) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr=0xdf52}}}, 0x88) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={@in={{0x10, 0x2, 0x0, @rand_addr}}}, 0x88) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x0, 0x41ff, @empty, 0x8001}}, r4, 0x0, 0x40000000, 0x0, 0x2}, 0x98) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, 0x0, 0x0) 00:06:53 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:53 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:53 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x0, 0x41ff, @empty, 0x8001}}, r4, 0x0, 0x40000000, 0x0, 0x2}, 0x98) 00:06:53 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, 0x0, 0x0) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) connect$unix(r3, 0x0, 0x0) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x0, 0x41ff, @empty, 0x8001}}, r4, 0x0, 0x40000000, 0x0, 0x2}, 0x98) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) wait4(r0, &(0x7f0000000040), 0x4, &(0x7f0000000100)) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:54 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x3f, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, 0x0, &(0x7f0000001ac0)) 00:06:54 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:54 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:54 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, 0x0, &(0x7f0000001ac0)) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, 0x0, &(0x7f0000001ac0)) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x200}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}, 0x0, 0x2, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}, 0x0, 0x0, 0x0, 0x800}, &(0x7f0000001ac0)=0x90) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}}, &(0x7f0000001ac0)=0x90) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}}, 0x0) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}}, 0x0) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000001a00)={@in6={{0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}}, 0x0) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x10000000, 0x81) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r1}, &(0x7f0000000100)=0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000000)={r1, 0x4, 0x1, [0x0]}, &(0x7f0000000140)=0xa) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}, r3}, 0x88) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r1}, &(0x7f0000000100)=0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000000)={r1, 0x4, 0x1, [0x0]}, &(0x7f0000000140)=0xa) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}, r3}, 0x88) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r1}, &(0x7f0000000100)=0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000000)={r1, 0x4, 0x1, [0x0]}, &(0x7f0000000140)=0xa) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}, r3}, 0x88) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r1}, &(0x7f0000000100)=0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:55 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 1: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r1}, &(0x7f0000000100)=0x88) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 1: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:55 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:55 executing program 1: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 0: setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 0: setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x9, @loopback, 0x8}}}, 0x88) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, 0x0, 0x0) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, 0x0, 0x0) 00:06:56 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, 0x0, 0x0) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x0, @loopback, 0x8}}}, 0x88) 00:06:57 executing program 2: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x0, @loopback}}}, 0x88) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 2: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 2: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 0: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 0: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r4, 0xd, &(0x7f0000000700)=0x2) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000740)={r6, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r8, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r7, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) dup2(r5, r3) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 0: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:57 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r4, 0xd, &(0x7f0000000700)=0x2) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000740)={r6, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r8, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r7, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) dup2(r5, r3) 00:06:57 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:57 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r4, 0xd, &(0x7f0000000700)=0x2) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000740)={r6, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r8, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r7, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) dup2(r5, r3) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r7, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r6, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r6, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r4, 0xd, &(0x7f0000000700)=0x2) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000740)={r6, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r8, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r7, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) dup2(r5, r3) 00:06:58 executing program 0: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 0: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r4, 0xd, &(0x7f0000000700)=0x2) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r6, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000740)={r6, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r8, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r7, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) dup2(r5, r3) 00:06:58 executing program 0: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r4, 0xd, &(0x7f0000000700)=0x2) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000740)={r6, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r8, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r7, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) dup2(r5, r3) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r7, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000440)={0x0, 0x9, 0x20, 0xffe0, 0x5, 0x8, 0xf801, 0x5, {@in6={{0x1c, 0x1c, 0x3, 0xbb6, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffe}}, r6, 0x7, 0x0, 0xfa, 0x100, 0xffffffff}}, &(0x7f00000003c0)=0xb0) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:58 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:58 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000a00)={r6, 0x44, "ebc05918facc26f4d01f9a56dc2c693d8d16b4b3f29c48a75ee6c04a12ee2d5f63d7cdcc329da0bb170da6fe6ba06093fb41203c970ff70d71957b2b7e0c0e23890cd6b1"}, &(0x7f0000000a80)=0x4c) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x7ff, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r4, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, 0x0, &(0x7f00000001c0)) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 0: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r3, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 0: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, 0x0, &(0x7f00000001c0)) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r3, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 0: socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, 0x0, &(0x7f00000001c0)) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r3, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x8, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r3, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:59 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x8002, 0x0, 0x0) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r3, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe28e, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) procctl$PROC_ASLR_CTL(0x0, r3, 0xd, &(0x7f0000000700)=0x2) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r9}, &(0x7f0000000100)=0x88) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) setsid() r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r2, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000680)={0x1, 0x1, r1, 0x7f, r1}) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x28, 0x6, 0x9, 0x7}) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r2, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:59 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x20) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:06:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r9}, &(0x7f0000000100)=0x88) 00:06:59 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r2, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:06:59 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = setsid() ktrace(&(0x7f00000007c0)='./file0\x00', 0x0, 0x8, r2) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r2, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000001c0)=0x20) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) setsid() r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r9}, &(0x7f0000000100)=0x88) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r1, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() writev(r0, &(0x7f0000000640)=[{&(0x7f0000000500)="6fd89c1d005ca6a511f780842263ad1ad88bd21f227e568f869205cf42cafa7e8d735bac", 0x24}, {&(0x7f0000000540)="900d367139fce43361c03a07efabf1d73a5a31dd490ea6f9c9b45a385724279efbb605db829a4a9a9aa830dd74deb1da025d5e7c98de2f3d88d334b5ae7e41f4fa5bd9282a83f706e43380013ce01ae7d0908d7610be19840f340330c930120e04c06a5fb55a6760ea1d71c57501d06a5a954df2ea99e8168eddf5de0f307a1091073fd1759ed81e09c1a960498354d6be5674128eb1609cd557c8980d3183f18ba800b33cae3314491442610c00fcd62c", 0xb1}, {&(0x7f0000000600)="d94947d6eecfa8d73dbd7917716e3842257ed5226b9df800dd3bdba396e6927c64fc02f7050b46c3732dae4a029805b933deef99f11ae32e", 0x38}], 0x3) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r7, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x7, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, r9}, &(0x7f0000000100)=0x88) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r1, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) getpid() r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080), 0x0) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r1) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r1, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r8}, 0x10) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r1, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/70, 0x46}], 0x3) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080), 0x0) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000080), 0x0) 00:07:00 executing program 2: ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x2, @broadcast}}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x98) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x2, @broadcast}}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x98) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:00 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:00 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x2, @broadcast}}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x98) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:00 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:01 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) 00:07:01 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:01 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:01 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(0x0, 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="64c20a00000003060300ff7f000000100000ff01ff7f0005e1cd5abe9e9231e11818e2dc7ca166109d4722cfe53665f1b80faeb52f5b1ec9ec82961c4aa27dcc9c64be53c94fb5463980e6ee8dee39f4ae29dcf75acd8a5127ac49ec806d90bf9fc2b82e756363f83af3630e6f4d5ea39c795acac54b195229fc1f1fb50be90ee6386b723a6092240fe69d7833e4de6668ce366899778e3374cba6c99c9c92ce18abfa51707f5d2cec4fed09a8d55eb7a69d41451803e7e8dd972496acb2a595cb3f6adc06086f9311c313232a7ec56fb2847847d55ea9dc22d6f21a7eb0dc76150e815b2cedf550a69edbcca3cdcad4edfcb1b13db5a50973e82af1b717ff498d"], &(0x7f0000000780)=0x1c) 00:07:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(0x0, 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(0x0, 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) socket$inet6_sctp(0x1c, 0x1, 0x84) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, 0x0, &(0x7f00000009c0)) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, 0x0, &(0x7f00000009c0)) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, 0x0, &(0x7f00000009c0)) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, 0x0}, &(0x7f00000009c0)=0x10) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, 0x0, &(0x7f0000000780)=0x1c) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, 0x0, &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, 0x0}, 0x0) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, 0x0, &(0x7f0000000780)=0x1c) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, 0x0}, 0x0) 00:07:02 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) ktrace(0x0, 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, 0x0}, 0x0) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[@ANYRES32], &(0x7f0000000780)=0x1c) 00:07:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:02 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[], &(0x7f0000000780)=0x1c) 00:07:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) 00:07:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[], 0x0) 00:07:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) fcntl$setstatus(r0, 0x4, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000003c0)={r3, 0x0, 0x6, 0xd84, 0x80, 0x1}, 0x14) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r4, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x5, @empty, 0xf8}}, r1, 0x100, 0x9, 0xa, 0x10001, 0x3, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x9, 0x2800, 0xdb78, 0x1, r5}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={0x0, &(0x7f0000000800)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f00000009c0)=0x10) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[], 0x0) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) r5 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000880)=ANY=[], 0x0) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) r5 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) r5 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) r5 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) r5 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) dup2(r2, r1) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) r5 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r3, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000100)={r4, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) dup2(r2, r1) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000100)={r3, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000100)={r3, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f0000000040), 0x4) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r1, 0x29, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000300)={r0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000300)={r0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000300)={r0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:03 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:03 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)={0xf1}, 0x1) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, 0x0, &(0x7f0000001700)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, 0x0, &(0x7f0000001700)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040), 0x1) 00:07:04 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, 0x0, &(0x7f0000001700)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:04 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:04 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040), 0x1) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000040), 0x1) 00:07:05 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000280)=ANY=[@ANYBLOB="1e00916afe16f10000", @ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000280)=ANY=[@ANYBLOB="1e00916afe16f10000", @ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000280)=ANY=[@ANYBLOB="1e00916afe16f10000", @ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="99d737bb0fd4d4259ab2d2768291c07641e7fdb8afe58e41d690e0da82c7df7fe1fc0ac2e622b221494e087731ae58ec9c1304a0ec69e762bdf369de80070c65fb89dad4d1c8b4017c17dac7f7904ab63bd3b4049847ebc1767b372101c85839ebed615caafb8e8f24cc9f651020e07bfd24c3369bb75501271ae850e38c95349be0dba8e6750812509c77131eaa3845e35b215c5bdd71ed334bde554fdcb27e879b55b4922c06242f5c04c7afc2ef191404baab", 0xb4}], 0x1, 0x8000000000000000) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f0000000300)={r1, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:05 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, 0x0, &(0x7f0000000380)) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, 0x0, &(0x7f0000000380)) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, 0x0, &(0x7f0000000380)) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r0}, &(0x7f0000000200)=0x88) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r0}, &(0x7f0000000200)=0x88) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:06 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r0}, &(0x7f0000000200)=0x88) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[@in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000380)=0x10) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, 0x0}, &(0x7f0000000380)=0x10) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, 0x0}, 0x0) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, 0x0}, 0x0) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000300)={r1, 0x0}, 0x0) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) procctl$PROC_WXMAP_STATUS(0x0, r6, 0x16, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, r7}, 0x88) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) procctl$PROC_WXMAP_STATUS(0x0, r6, 0x16, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, r7}, 0x88) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:06 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:06 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) procctl$PROC_WXMAP_STATUS(0x0, r6, 0x16, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, r7}, 0x88) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) procctl$PROC_WXMAP_STATUS(0x0, r6, 0x16, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, r7}, 0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) procctl$PROC_WXMAP_STATUS(0x0, r6, 0x16, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, r7}, 0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) procctl$PROC_WXMAP_STATUS(0x0, r5, 0x16, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x9, 0x3ff, r0, 0xbc, r0}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x10000, 0x0, 0x43a}, 0x14) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, 0x0, &(0x7f0000001700)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, 0x0, 0x0) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000040)={0x0, 0x21, "115713afc29503ca30d9251cc5c4d04f49fc7dc916d81bf9d61929d1655dea699c"}, &(0x7f0000000080)=0x29) 00:07:07 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, 0x0, &(0x7f0000001700)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:07 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, 0x0, 0x0) 00:07:07 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, 0x0, &(0x7f0000000080)) 00:07:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, 0x0, &(0x7f0000001700)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, 0x0, 0x0) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, 0x0, &(0x7f0000000080)) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10000, 0x0, 0x43a}, 0x14) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, 0x0, &(0x7f0000000080)) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040), &(0x7f0000000080)=0x8) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040), 0x0) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10000}, 0x14) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040), 0x0) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000040), 0x0) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={r4, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={r4, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:08 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={r4, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 00:07:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:08 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={r4, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={r4, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 0: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, 0x0, &(0x7f0000000200)) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:09 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, 0x0, &(0x7f0000000200)) 00:07:09 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:09 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, 0x0, &(0x7f0000000200)) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}}, &(0x7f0000000200)=0x88) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, 0x0) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, 0x0) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, 0x0) 00:07:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:10 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:10 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:10 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:11 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:11 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:12 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:12 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:12 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:12 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(0xffffffffffffffff, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x43a}, 0x14) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, 0x0, 0x0) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x32, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d"}, 0x3a) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x1, "d6"}, 0x9) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, 0x0, 0x0) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, 0x0, 0x0) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000100), 0x14) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:14 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:14 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x32, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d"}, 0x3a) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x1, "d6"}, 0x9) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={@in={{0x10, 0x2, 0x3, @multicast2}}, r1}, &(0x7f0000000200)=0x88) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}}, 0x88) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:15 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() r1 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r1, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) bindat(0xffffffffffffff9c, r1, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0xa09}, 0x2}, 0x1c) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000e97e"], &(0x7f0000001700)=0x4) 00:07:15 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:15 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:16 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x0) 00:07:16 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:16 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:16 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:16 executing program 2: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x32, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d"}, 0x3a) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x1, "d6"}, 0x9) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:17 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:17 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x10) 00:07:17 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:17 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x10) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x10) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:18 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:18 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) 00:07:18 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800, r3}}], 0x80, 0x5}, 0x20100) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x63, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d2584253a037dea26156c0947b687b048eef28bbe3869fdc6d6d59910440ecfcf3aa288efb508686be06711018d96ee76e1"}, 0x6b) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @rand_addr=0xffff8000}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYBLOB="0bcd0583d1eb00040000"], &(0x7f0000001700)=0x4) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, 0x0, &(0x7f0000000040)) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}, 0x0, 0x4, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x32, "d68c640124d0588e7514481dc7e0c910ff15d14e07581221230ef0af679607d166bf5231195740a8967fbe8c06eda4882c6d"}, 0x3a) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:19 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) 00:07:19 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x1, "d6"}, 0x9) 00:07:19 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x5, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:19 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x0) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x0, 0x1, "d6"}, 0x9) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, 0x20c, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3}, &(0x7f0000000040)=0x98) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000040)=0x98) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}}, &(0x7f0000000040)=0x98) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}}, 0x0) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}}, 0x0) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={@in={{0x10, 0x2, 0x0, @rand_addr}}}, 0x0) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040), 0x8) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:20 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:20 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) setpgid(r0, r2) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:20 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) setpgid(r0, r2) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 00:07:20 executing program 0: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:20 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) 00:07:20 executing program 0: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:20 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) setpgid(r0, r2) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0), &(0x7f0000001700)=0x4) 00:07:21 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) setpgid(r0, r2) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x6}, 0x10) 00:07:21 executing program 0: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) setpgid(r0, r1) 00:07:21 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) dup2(0xffffffffffffffff, r1) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) socket$inet6_sctp(0x1c, 0x5, 0x84) 00:07:21 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet_sctp(0x2, 0x5, 0x84) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:21 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) dup2(0xffffffffffffffff, r1) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:21 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:21 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) dup2(0xffffffffffffffff, r1) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:21 executing program 0: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:21 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:21 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 00:07:21 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:21 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:21 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x5, 0xffff, 0x0, 0x706}) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f0000000080)={0xfffffffe, 0x81, 0x4}) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 00:07:22 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:22 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x5, 0xffff, 0x0, 0x706}) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r2, r1) 00:07:22 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:22 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x5, 0xffff, 0x0, 0x706}) 00:07:22 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, 0xffffffffffffffff) 00:07:22 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:22 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, 0xffffffffffffffff) 00:07:22 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, 0xffffffffffffffff) 00:07:22 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:22 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) getpid() r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:22 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 2: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:22 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:22 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:22 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x23) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x23) 00:07:23 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:23 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x0, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:23 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(0x0, 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x23) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x23) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[], 0x23) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x1c, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000700)=ANY=[@ANYBLOB="f00000fbc9fe387bc64f35e247ff796b6d295f5c65f7c235ac03be1d5ee02c8c4136d9270700000000000000d3fa7ea4f662baef4c2e34f908e1e510013ca2db9e3790a5b1a403eac53275fa1735d42340d2e52a5e9d6b05ecaa4aa955a4945981f43a0000000000009a60", @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x1c, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000700)=ANY=[@ANYBLOB="f00000fbc9fe387bc64f35e247ff796b6d295f5c65f7c235ac03be1d5ee02c8c4136d9270700000000000000d3fa7ea4f662baef4c2e34f908e1e510013ca2db9e3790a5b1a403eac53275fa1735d42340d2e52a5e9d6b05ecaa4aa955a4945981f43a0000000000009a60", @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x0, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) r6 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x1c, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000700)=ANY=[@ANYBLOB="f00000fbc9fe387bc64f35e247ff796b6d295f5c65f7c235ac03be1d5ee02c8c4136d9270700000000000000d3fa7ea4f662baef4c2e34f908e1e510013ca2db9e3790a5b1a403eac53275fa1735d42340d2e52a5e9d6b05ecaa4aa955a4945981f43a0000000000009a60", @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x1c, 0x5, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000700)=ANY=[@ANYBLOB="f00000fbc9fe387bc64f35e247ff796b6d295f5c65f7c235ac03be1d5ee02c8c4136d9270700000000000000d3fa7ea4f662baef4c2e34f908e1e510013ca2db9e3790a5b1a403eac53275fa1735d42340d2e52a5e9d6b05ecaa4aa955a4945981f43a0000000000009a60", @ANYRES32=0x0], &(0x7f0000001700)=0x8) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b"}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca24274c4c1d7ec66d539d717213c2a24"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) socket(0x1c, 0x5, 0x7) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b"}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, r0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:24 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b"}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000200)="d55ddd6fbd434c10c59f5521b4115e6f133809ed0c8cbc96efa8e552894344abd6335dd1bfd91452018720f7feaaa2fd1e97a481878c94bbef6b341174159da281d3216ebb4a1b62bc5a636bd185ea1de28ac60708c2a5f0f8e71abad0f6f1ba7cd1e54e0ae422f260235609eeebc7a83368d25d0b91ec51373a20ec74b640cd0ee7d5d47d4950260d65ef9485a5832b83f1ff1b7a39c4ad9e0adc71299aa5004fb14b756d36cc14ea79eba857367beacd09539c06599797320ceaddbf514fc8bce1ace2e0a79fbcfd9c454ffa730f131b95dc595a2c2d1e3557e4e5b7645854e45d0d61f547", 0xe6}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:24 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:24 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x2, @broadcast}, 0x10) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, 0x0) procctl$PROC_REAP_KILL(0x0, r0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, 0x0, 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x5, 0xffff, r0, 0x706, r0}) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300), 0x0, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, 0x0) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, 0x0) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000580)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x0, 0x400, 0x0, 0x6, 0x1}, &(0x7f00000003c0)=0x98) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32=r4, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300), 0x0, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, 0x0) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x8002, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x98) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x0, 0xffff, r0, 0x706, r0}) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) r3 = dup2(r2, r1) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05001b00a3f8c4be8261ea22055ddca2"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300), 0x0, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x0, 0xffff, r0, 0x706, r0}) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x0, 0xffff, r0, 0x706, r0}) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="05"], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 0: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="fd60185af8616a0a96ddccc1cd90b72b", 0x4}, 0x1c, &(0x7f0000000300)=[{0x0}], 0x1, &(0x7f0000000380)=[@init={0x14, 0x84, 0x1, {0x6, 0x6, 0x5, 0x1}}, @authinfo={0x10, 0x84, 0x8, {0x1000}}, @init={0x14, 0x84, 0x1, {0xc8, 0x5, 0x9, 0x800}}, @sndrcv={0x2c, 0x84, 0x2, {0xb1, 0x3f, 0x2000, 0x6a, 0x2, 0x6, 0xb18e, 0x5}}, @sndinfo={0x1c, 0x84, 0x4, {0x5, 0x1000, 0xf1, 0x800}}], 0x80, 0x5}, 0x20100) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 00:07:25 executing program 2: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000040)={0x415, 0x8, 0x0, 0xa93b}) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000680)={0xf1, 0x100, 0x4, 0x8}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x46bf, @mcast1, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000100)="0be42c2e54e3c8b6aff499cfb8c716ba7b2ce0b6731fb4b179c96c33c5610af4a4628bc2a8f032df369f04bf13a1e08f92ab93dbd0d1e397e5fc0b7f61e06f", 0x3f}, {&(0x7f0000000140)="2ce1bf703dfdc09063d6b0f2bfff1a12526ccbe1e643f5b13ca3ef1ae2d7127fd7997f56835185bc7527a5df7d189c520ab71ac1c7f7da4eaf3f7917fd5fa4be971ce255dcb186a68105fba1b85e440ed10d", 0x52}, {&(0x7f00000001c0)="17819ed8eb5ca542daa943e5fff444be62000d2297ece8162cea1b4e1d9f4604bc45f12639b14959c679436adaf0c7c7216f7220db4c9f67ac04d4775206ff404560ea3fedc1026f534ca494bc86192e41a4b8a0c9e466f39d2dbf5b924e67c328ae3f51daf471ed6a36f1e3a03ca9280bec7361c9d1ee19b5eb7e7632118481e728f9eed1db44f4c0", 0x89}, {&(0x7f0000000340)="75065a1d8ef1428903922540304356b9e80c59b3a123dc888be090b6", 0x1c}, {&(0x7f0000000440)="d4c77f8fd0484a48341d0b982d9fef5774f818ec314f3b63c5d5b21effb12b508e3fe97d193ed97b6e906be9a6a8fb32c143cd5983d53fc8e6a79b7b9f2fdccd9d0fd2ff4fb7949c1380c866bd434bac48c58cbe6a88a9c046fa57a5ddd0ba939680199fdc266d306a861c10fac6986c2090c94b77097c4fdaf5b26d543810e8a9616592d900", 0x86}, {&(0x7f0000000380)="07acba8a5501263556674fe5f98417abe29bbdde1409be88f26cdf917d5c67a4f026a72e1f", 0x25}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="2c000000840000000200000000018000004300001ded000002000000050000000500000000000000", @ANYRES32, @ANYBLOB="1400000084000000070000000300000002000000"], 0x40, 0x100}, 0x8) 00:07:25 executing program 1: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375005, 0xc7}) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0x23) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 00:07:25 executing program 3: sysarch$I386_SET_PKRU(0xb, &(0x7f0000000000)={0x375002, 0xc7}) open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x14, r0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x5, 0x0, r0, 0x706, r0}) panic: already suspended cpuid = 0 time = 445 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0xc7/frame 0xfffffe00a5a22530 kdb_backtrace() at kdb_backtrace+0xd3/frame 0xfffffe00a5a22690 vpanic() at vpanic+0x254/frame 0xfffffe00a5a22770 panic() at panic+0xb5/frame 0xfffffe00a5a22830 thread_suspend_one() at thread_suspend_one+0x107/frame 0xfffffe00a5a22860 thread_single() at thread_single+0x79c/frame 0xfffffe00a5a22910 reap_kill_proc() at reap_kill_proc+0x4b8/frame 0xfffffe00a5a22990 reap_kill() at reap_kill+0x7fc/frame 0xfffffe00a5a22ba0 kern_procctl() at kern_procctl+0x51a/frame 0xfffffe00a5a22c10 sys_procctl() at sys_procctl+0x247/frame 0xfffffe00a5a22d30 amd64_syscall() at amd64_syscall+0x410/frame 0xfffffe00a5a22f30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe00a5a22f30 --- syscall (198, FreeBSD ELF64, nosys), rip = 0x28a47a, rsp = 0x82f535f08, rbp = 0x82f535f70 --- KDB: enter: panic [ thread pid 81987 tid 203502 ] Stopped at kdb_enter+0x6b: movq $0,0x275bd0a(%rip) db> db> set $lines = 0 db> set $maxwidth = 0 db> show registers cs 0x20 ds 0x3b es 0x3b fs 0x13 gs 0x1b ss 0x28 rax 0x12 rcx 0xfffffe00ab800000 rdx 0x3ffff rbx 0 rsp 0xfffffe00a5a22670 rbp 0xfffffe00a5a22690 rsi 0x40001 rdi 0xffffffff8172ade8 printf+0x158 r8 0 r9 0xffffffff r10 0 r11 0 r12 0 r13 0xfffffe00a5dd2560 r14 0xffffffff82b5a9c0 .str.26 r15 0xffffffff82b5a9c0 .str.26 rip 0xffffffff8171a90b kdb_enter+0x6b rflags 0x46 kdb_enter+0x6b: movq $0,0x275bd0a(%rip) db> show proc Process 81987 (syz-executor.3) at 0xfffffe00aae6a548: state: NORMAL uid: 0 gids: 0, 0, 5 parent: pid 79405 at 0xfffffe00aae6b000 ABI: FreeBSD ELF64 flag: 0x10080080 flag2: 0 arguments: /root/syz-executor.3 exec reaper: 0xfffffe0053de3000 reapsubtree: 1 sigparent: 20 vmspace: 0xfffffe00aad559f8 (map 0xfffffe00aad559f8) (map.pmap 0xfffffe00aad55ab8) (pmap 0xfffffe00aad55b20) threads: 3 200961 s syz-executor.3 203502 Run CPU 0 syz-executor.3 203505 s syz-executor.3 db> ps pid ppid pgrp uid state wmesg wchan cmd 81987 79405 79405 0 T (threaded) syz-executor.3 200961 s syz-executor.3 203502 Run CPU 0 syz-executor.3 203505 s syz-executor.3 81986 778 778 0 TL (threaded) syz-executor.2 201393 s syz-executor.2 203501 Ss uwait 0xfffffe0058df7280 syz-executor.2 203504 RunQ syz-executor.2 203507 RunQ syz-executor.2 81985 777 777 0 R (threaded) syz-executor.0 199401 RunQ syz-executor.0 203500 S uwait 0xfffffe005730e900 syz-executor.0 81984 779 779 0 R (threaded) syz-executor.1 197193 RunQ syz-executor.1 203499 Run CPU 1 syz-executor.1 203503 RunQ syz-executor.1 203506 S uwait 0xfffffe00a6886d00 syz-executor.1 81802 1 81802 65 Ss select 0xfffffe0058df9340 dhclient 80384 1 79405 0 RV syz-executor.3 80377 80374 79405 0 SV uwait 0xfffffe00a6886000 syz-executor.3 80374 1 79405 0 DV ppwait 0xfffffe00aade8f88 syz-executor.3 80363 1 79405 0 SV uwait 0xfffffe005787ab00 syz-executor.3 79499 1 779 0 SV uwait 0xfffffe00a6886e00 syz-executor.1 79487 1 779 0 SV uwait 0xfffffe0058df7d80 syz-executor.1 79478 1 79478 0 Ss select 0xfffffe009f11b640 dhclient 79472 1 79472 0 Ss select 0xfffffe009f11a5c0 dhclient 79405 774 79405 0 Ss nanslp 0xffffffff83e43cc1 syz-executor.3 79085 1 778 0 S uwait 0xfffffe009f11c280 syz-executor.2 79084 1 778 0 S uwait 0xfffffe0058df8480 syz-executor.2 79077 1 778 0 S uwait 0xfffffe0057878080 syz-executor.2 79076 1 778 0 S uwait 0xfffffe005787ae00 syz-executor.2 79074 1 778 0 S uwait 0xfffffe005730d200 syz-executor.2 53573 1 778 0 S uwait 0xfffffe0057878380 syz-executor.2 53569 1 778 0 S uwait 0xfffffe0058df8580 syz-executor.2 53553 1 778 0 S uwait 0xfffffe0057877480 syz-executor.2 41408 1 777 0 SV uwait 0xfffffe0058df7480 syz-executor.0 41401 1 777 0 SV uwait 0xfffffe00a6887780 syz-executor.0 41394 1 777 0 SV uwait 0xfffffe005730ef00 syz-executor.0 40919 1 777 0 S uwait 0xfffffe0057877180 syz-executor.0 40911 1 777 0 S uwait 0xfffffe009f11c380 syz-executor.0 38759 1 779 0 SV uwait 0xfffffe00a6886f00 syz-executor.1 38749 1 779 0 SV uwait 0xfffffe005787af00 syz-executor.1 38735 1 779 0 SV uwait 0xfffffe0057878880 syz-executor.1 35865 1 777 0 S uwait 0xfffffe0058df8980 syz-executor.0 35860 1 777 0 S uwait 0xfffffe0058df7e80 syz-executor.0 35856 1 777 0 S uwait 0xfffffe0058df7680 syz-executor.0 35851 1 777 0 S uwait 0xfffffe0058dfa300 syz-executor.0 35845 1 777 0 S uwait 0xfffffe0058df7a80 syz-executor.0 35842 1 777 0 S uwait 0xfffffe0053ee2600 syz-executor.0 35837 1 777 0 S uwait 0xfffffe009f11d500 syz-executor.0 35835 1 777 0 S uwait 0xfffffe005787ad00 syz-executor.0 35827 1 777 0 S uwait 0xfffffe0058df7180 syz-executor.0 35825 1 779 0 S uwait 0xfffffe009f11d000 syz-executor.1 35821 1 777 0 S uwait 0xfffffe005730b380 syz-executor.0 35814 1 777 0 S uwait 0xfffffe0058df8280 syz-executor.0 35808 1 777 0 S uwait 0xfffffe0058df7380 syz-executor.0 35800 1 777 0 S uwait 0xfffffe0058df8680 syz-executor.0 35661 1 779 0 S uwait 0xfffffe0057877380 syz-executor.1 35657 1 779 0 S uwait 0xfffffe0058df8380 syz-executor.1 35651 1 779 0 S uwait 0xfffffe009f11d600 syz-executor.1 32047 0 0 0 DL - 0xffffffff83f639c0 [soaiod4] 32046 0 0 0 DL - 0xffffffff83f639c0 [soaiod3] 32045 0 0 0 DL - 0xffffffff83f639c0 [soaiod2] 32044 0 0 0 DL - 0xffffffff83f639c0 [soaiod1] 15701 1 15701 65 Ss select 0xfffffe009f11cc40 dhclient 12449 1 12449 0 Ss select 0xfffffe009f11cd40 dhclient 12446 1 12446 0 Ss select 0xfffffe00a6887840 dhclient 9913 1 9913 65 Ss select 0xfffffe00a6887a40 dhclient 6434 1 6434 0 Ss select 0xfffffe0058df7f40 dhclient 6431 1 6431 0 Ss select 0xfffffe00a6887ac0 dhclient 6377 1 6377 65 Ss select 0xfffffe005730e740 dhclient 1463 1 1463 0 Ss select 0xfffffe005730e7c0 dhclient 1460 1 1460 0 Ss select 0xfffffe009f11d9c0 dhclient 854 0 0 0 DL aiordy 0xfffffe009e95ba90 [aiod4] 853 0 0 0 DL aiordy 0xfffffe009f03c548 [aiod3] 852 0 0 0 DL aiordy 0xfffffe009f038548 [aiod2] 851 0 0 0 DL aiordy 0xfffffe009f038a90 [aiod1] 779 774 779 0 Ss nanslp 0xffffffff83e43cc1 syz-executor.1 778 774 778 0 Ss nanslp 0xffffffff83e43cc0 syz-executor.2 777 774 777 0 Ss nanslp 0xffffffff83e43cc0 syz-executor.0 774 772 772 0 S (threaded) syz-fuzzer 100108 S uwait 0xfffffe0058dfa500 syz-fuzzer 100110 S uwait 0xfffffe0057879700 syz-fuzzer 100111 S kqread 0xfffffe0053c90300 syz-fuzzer 100112 S uwait 0xfffffe0057879900 syz-fuzzer 100113 S uwait 0xfffffe0057879a00 syz-fuzzer 100114 S uwait 0xfffffe0057879b00 syz-fuzzer 100115 S uwait 0xfffffe0057878480 syz-fuzzer 100116 S uwait 0xfffffe0058dfa600 syz-fuzzer 100118 S uwait 0xfffffe0058dfa700 syz-fuzzer 772 770 772 0 Ss pause 0xfffffe009ef51b40 csh 770 688 770 0 Ss select 0xfffffe0058df9b40 sshd 756 1 756 0 Ss+ ttyin 0xfffffe0057463cb0 getty 755 1 755 0 Ss+ ttyin 0xfffffe0057462cb0 getty 754 1 754 0 Ss+ ttyin 0xfffffe00579b4cb0 getty 753 1 753 0 Ss+ ttyin 0xfffffe00579b50b0 getty 752 1 752 0 Ss+ ttyin 0xfffffe00579b54b0 getty 751 1 751 0 Ss+ ttyin 0xfffffe00579b58b0 getty 750 1 750 0 Ss+ ttyin 0xfffffe00579b5cb0 getty 749 1 749 0 Ss+ ttyin 0xfffffe00579b60b0 getty 748 1 748 0 Ss+ ttyin 0xfffffe00579b64b0 getty 693 1 693 0 Ss nanslp 0xffffffff83e43cc0 cron 688 1 688 0 Ss select 0xfffffe0058df9f40 sshd 501 1 501 0 Ss select 0xfffffe0058dfa140 syslogd 430 1 430 0 Ss select 0xfffffe0057878a40 devd 429 1 429 65 Ss select 0xfffffe0058dfa0c0 dhclient 344 1 344 0 Ss select 0xfffffe0058df9dc0 dhclient 341 1 341 0 Ss select 0xfffffe0057878ac0 dhclient 17 0 0 0 DL vlruwt 0xfffffe0056f9b548 [vnlru] 16 0 0 0 DL syncer 0xffffffff83f694e0 [syncer] 15 0 0 0 DL (threaded) [bufdaemon] 100079 D psleep 0xffffffff83f67b00 [bufdaemon] 100082 D - 0xffffffff83211f80 [bufspacedaemon-0] 100093 D sdflush 0xfffffe00579488e8 [/ worker] 9 0 0 0 DL psleep 0xffffffff83f9b5c0 [vmdaemon] 8 0 0 0 DL (threaded) [pagedaemon] 100077 D psleep 0xffffffff83f8f478 [dom0] 100083 D launds 0xffffffff83f8f484 [laundry: dom0] 100084 D umarcl 0xffffffff81e4c3f0 [uma] 7 0 0 0 DL - 0xffffffff83c002a8 [rand_harvestq] 6 0 0 0 DL pftm 0xffffffff84933550 [pf purge] 5 0 0 0 DL waiting 0xffffffff84728420 [sctp_iterator] 4 0 0 0 DL (threaded) [cam] 100044 D - 0xffffffff83aa3240 [doneq0] 100045 D - 0xffffffff83aa31c0 [async] 100076 D - 0xffffffff83aa3040 [scanner] 14 0 0 0 DL seqstat 0xfffffe0056f00c88 [sequencer 00] 3 0 0 0 DL (threaded) [crypto] 100040 D crypto_ 0xffffffff83f8aca0 [crypto] 100041 D crypto_ 0xfffffe0053ed8d30 [crypto returns 0] 100042 D crypto_ 0xfffffe0053ed8d80 [crypto returns 1] 13 0 0 0 DL (threaded) [geom] 100035 D - 0xffffffff83e192c0 [g_event] 100036 D - 0xffffffff83e192e0 [g_up] 100037 D - 0xffffffff83e19300 [g_down] 2 0 0 0 WL (threaded) [clock] 100029 I [clock (0)] 100030 I [clock (1)] 12 0 0 0 WL (threaded) [intr] 100015 I [swi5: fast taskq] 100018 I [swi6: task queue] 100019 I [swi6: Giant taskq] 100031 I [swi1: netisr 0] 100032 I [swi1: hpts] 100033 I [swi1: hpts] 100046 I [irq24: virtio_pci0] 100047 I [irq25: virtio_pci0] 100048 I [irq26: virtio_pci0] 100049 I [irq27: virtio_pci0] 100050 I [irq28: virtio_pci1] 100051 I [irq29: virtio_pci1] 100052 I [irq30: virtio_pci1] 100053 I [irq31: virtio_pci1] 100054 I [irq32: virtio_pci1] 100059 I [irq33: virtio_pci2] 100060 I [irq34: virtio_pci2] 100061 I [irq35: virtio_pci2] 100063 I [irq1: atkbd0] 100064 I [irq12: psm0] 100065 I [swi0: uart uart++] 100069 I [swi1: pf send] 11 0 0 0 RL (threaded) [idle] 100003 CanRun [idle: cpu0] 100004 CanRun [idle: cpu1] 1 0 1 0 SLs wait 0xfffffe0053de3000 [init] 10 0 0 0 DL audit_w 0xffffffff83f8b780 [audit] 0 0 0 0 DLs (threaded) [kernel] 100000 D swapin 0xffffffff83e19cc0 [swapper] 100005 D - 0xfffffe0053e94100 [if_config_tqg_0] 100006 D - 0xfffffe0053e94000 [softirq_0] 100007 D - 0xfffffe0053e93e00 [softirq_1] 100008 D - 0xfffffe0053e93d00 [if_io_tqg_0] 100009 D - 0xfffffe0053e93c00 [if_io_tqg_1] 100010 D - 0xfffffe000796d600 [inm_free taskq] 100011 D - 0xfffffe000796d400 [linuxkpi_irq_wq] 100012 D - 0xfffffe000796d200 [in6m_free taskq] 100013 D - 0xfffffe000796d000 [deferred_unmount ta] 100014 D - 0xfffffe000796cd00 [thread taskq] 100016 D - 0xfffffe000796c900 [kqueue_ctx taskq] 100017 D - 0xfffffe000796c700 [pci_hp taskq] 100020 D - 0xfffffe000796c100 [aiod_kick taskq] 100021 D - 0xfffffe000796be00 [linuxkpi_short_wq_0] 100022 D - 0xfffffe000796be00 [linuxkpi_short_wq_1] 100023 D - 0xfffffe000796be00 [linuxkpi_short_wq_2] 100024 D - 0xfffffe000796be00 [linuxkpi_short_wq_3] 100025 D - 0xfffffe000796b900 [linuxkpi_long_wq_0] 100026 D - 0xfffffe000796b900 [linuxkpi_long_wq_1] 100027 D - 0xfffffe000796b900 [linuxkpi_long_wq_2] 100028 D - 0xfffffe000796b900 [linuxkpi_long_wq_3] 100034 D - 0xfffffe0053f06300 [firmware taskq] 100038 D - 0xfffffe0053f05d00 [crypto_0] 100039 D - 0xfffffe0053f05d00 [crypto_1] 100055 D - 0xfffffe0053f04e00 [vtnet0 rxq 0] 100056 D - 0xfffffe0053f04d00 [vtnet0 txq 0] 100057 D - 0xfffffe0053f04c00 [vtnet0 rxq 1] 100058 D - 0xfffffe0053f04b00 [vtnet0 txq 1] 100062 D vtbslp 0xfffffe005730da00 [virtio_balloon] 100066 D - 0xffffffff82b60840 [deadlkres] 100070 D - 0xfffffe000796e200 [mca taskq] 100071 D - 0xfffffe005787e000 [acpi_task_0] 100072 D - 0xfffffe005787e000 [acpi_task_1] 100073 D - 0xfffffe005787e000 [acpi_task_2] 100075 D - 0xfffffe0053f05600 [CAM taskq] db> show all locks Process 81987 (syz-executor.3) thread 0xfffffe00a5dd2560 (203502) exclusive sleep mutex process lock (process lock) r = 0 (0xfffffe00aa85bbb8) locked @ /syzkaller/managers/main/kernel/sys/kern/kern_thread.c:1523 exclusive sx sapblk (sapblk) r = 0 (0xffffffff83e32060) locked @ /syzkaller/managers/main/kernel/sys/kern/kern_proc.c:3405 db> show malloc Type InUse MemUse Requests pf_hash 5 11524K 5 tcp_hpts 7 4801K 7 devbuf 4217 4323K 4245 sysctloid 35322 2081K 35393 vtbuf 24 1968K 46 kobj 328 1312K 490 pcb 583 1167K 284954 newblk 21 1029K 177940 vfscache 3 1025K 3 inodedep 787 807K 91214 filedesc 96 762K 160586 ufs_quota 1 512K 1 vfs_hash 1 512K 1 callout 2 512K 2 intr 4 472K 4 subproc 225 462K 82121 vmem 3 304K 6 sctp_stro 238 238K 37120 sctp_atcl 518 195K 179128 dirrem 756 189K 86033 acpica 1674 184K 57552 vnet_data 1 168K 1 tidhash 3 141K 3 linker 358 134K 418 pagedep 22 134K 80340 tfo_ccache 1 128K 1 DEVFS1 109 109K 141 sem 4 106K 4 freefile 760 95K 85969 BPF 46 88K 191 bus 995 81K 5208 mtx_pool 2 72K 2 syncache 1 68K 1 module 514 65K 514 acpitask 1 64K 1 ddb_capture 1 64K 1 sctp_timw 254 64K 254 kdtrace 310 58K 185496 umtx 462 58K 462 temp 35 34K 17095 DEVFS3 128 32K 143 hostcache 1 32K 1 shm 1 32K 300 sctp_atky 756 32K 222271 pf_osfp 251 31K 251 msg 4 30K 4 gtaskqueue 18 26K 18 routetbl 426 25K 1266 ufs_dirhash 105 24K 105 kbdmux 6 22K 6 ifaddr 71 21K 123 DEVFS_RULE 56 20K 56 ufs_mount 4 17K 5 proc 3 17K 3 tty 16 16K 16 ithread 97 16K 97 bus-sc 34 15K 1681 lltable 44 14K 404 KTRACE 102 13K 25112 ether_multi 157 13K 348 ifnet 7 13K 12 eventhandler 136 12K 136 kenv 95 12K 95 rman 88 11K 431 GEOM 61 11K 490 CAM queue 5 11K 1528 in6_multi 71 9K 139 kqueue 106 9K 82075 bmsafemap 3 9K 88473 sctp_athm 518 9K 179541 UART 12 9K 12 devstat 4 9K 4 ksem 1 8K 2072 rpc 2 8K 2 shmfd 1 8K 178 pfs_vncache 1 8K 1 pfs_nodes 20 8K 20 sctp_map 476 8K 74240 audit_evclass 237 8K 296 cred 27 7K 807 taskqueue 63 7K 63 pwddesc 104 7K 82171 sglist 5 7K 5 CAM DEV 3 6K 510 plimit 24 6K 822 pf_ifnet 12 5K 272 UMA 272 5K 272 session 35 5K 235 DEVFSP 68 5K 1929 vt 11 5K 11 proc-args 131 5K 84763 memdesc 1 4K 1 MCA 32 4K 32 evdev 4 4K 4 lockf 36 4K 148 acpisem 28 4K 28 selfd 55 4K 1079109 hhook 15 4K 17 kcovinfo 52 4K 117 terminal 11 3K 11 sctp_ifa 19 3K 27 ip6ndp 14 3K 29 select 19 3K 1820 CC Mem 36 3K 25338 uidinfo 3 3K 283 local_apic 1 2K 1 io_apic 1 2K 1 fpukern_ctx 2 2K 2 ipsec-saq 2 2K 2 newdirblk 15 2K 80297 mkdir 14 2K 160594 diradd 14 2K 86097 Unitno 30 2K 1373 CAM XPT 22 2K 543 msi 12 2K 12 in_multi 6 2K 14 inpcbpolicy 47 2K 33770 freework 6 2K 122301 freeblks 5 2K 86172 ipsecpolicy 2 2K 2 acpidev 20 2K 20 clone 9 2K 9 tun 7 2K 12 softdep 1 1K 1 sahead 1 1K 1 secasvar 1 1K 1 nhops 6 1K 8 vnodemarker 2 1K 238 NFSD session 1 1K 1 osd 40 1K 25075 CAM periph 4 1K 271 sctp_ifn 6 1K 27 ipsec 3 1K 3 mld 6 1K 11 igmp 6 1K 11 toponodes 6 1K 6 isadev 6 1K 6 mount 16 1K 121 pci_link 10 1K 10 crypto 4 1K 366 encap_export_host 12 1K 12 procdesc 5 1K 32 pfil 4 1K 4 cdev 2 1K 2 chacha20random 1 1K 1 eventfd 3 1K 432 tcp_fsb 2 1K 8949 NFSD lckfile 1 1K 1 NFSD V4client 1 1K 1 DEVFS 9 1K 10 vnodes 1 1K 1 CAM SIM 2 1K 2 feeder 7 1K 7 tcpfunc 3 1K 3 loginclass 3 1K 6 prison 6 1K 6 lkpikmalloc 5 1K 6 aesni_data 2 1K 2 cryptodev 2 1K 2053 nexusdev 8 1K 8 apmdev 1 1K 1 atkbddev 2 1K 2 CAM dev queue 2 1K 2 CAM I/O Scheduler 1 1K 1 CAM path 4 1K 1034 pmchooks 1 1K 1 soname 4 1K 144793 filecaps 5 1K 317 sctp_vrf 1 1K 1 sctp_aadr 1 1K 816 ip_msource 1 1K 1 vnet 1 1K 1 entropy 2 1K 75 pmc 1 1K 1 acpiintr 1 1K 1 cpus 2 1K 2 vnet_data_free 1 1K 1 Per-cpu 1 1K 1 p1003.1b 1 1K 1 mqdata 0 0K 0 tcp_do 0 0K 0 pf_table 0 0K 0 pf_rule 0 0K 651 pf_altq 0 0K 0 pf_temp 0 0K 0 filemon 0 0K 129 sctp_mcore 0 0K 0 sctp_socko 0 0K 119632 sctp_iter 0 0K 53 sctp_mvrf 0 0K 0 sctp_cpal 0 0K 18 sctp_cmsg 0 0K 0 sctp_stre 0 0K 0 sctp_athi 0 0K 0 sctp_a_it 0 0K 35 sctp_stri 0 0K 540 ipcomp 0 0K 0 esp 0 0K 0 ah 0 0K 0 NFSCL layrecall 0 0K 0 NFSCL session 0 0K 0 madt_table 0 0K 2 smartpqi 0 0K 0 NFSCL sockreq 0 0K 0 NFSCL devinfo 0 0K 0 NFSCL flayout 0 0K 0 ixl 0 0K 0 NFSCL layout 0 0K 0 NFSD rollback 0 0K 0 NFSCL diroff 0 0K 0 NEWdirectio 0 0K 0 NEWNFSnode 0 0K 0 NFSCL lck 0 0K 0 NFSCL lckown 0 0K 0 ice-resmgr 0 0K 0 ice-osdep 0 0K 0 ice 0 0K 0 iavf 0 0K 0 axgbe 0 0K 0 NFSCL client 0 0K 0 NFSCL deleg 0 0K 0 NFSCL open 0 0K 0 NFSCL owner 0 0K 0 NFS fh 0 0K 0 NFS req 0 0K 0 NFSD usrgroup 0 0K 0 NFSD string 0 0K 0 NFSD V4lock 0 0K 0 xen_intr 0 0K 0 NFSD V4state 0 0K 0 xen_hvm 0 0K 0 legacydrv 0 0K 0 bounce 0 0K 0 busdma 0 0K 0 qpidrv 0 0K 0 NFSD srvcache 0 0K 0 msdosfs_fat 0 0K 0 dmar_idpgtbl 0 0K 0 dmar_dom 0 0K 0 dmar_ctx 0 0K 0 msdosfs_mount 0 0K 0 msdosfs_node 0 0K 0 isci 0 0K 0 iommu_dmamap 0 0K 0 hyperv_socket 0 0K 0 bxe_ilt 0 0K 0 xenbus 0 0K 0 DEVFS4 0 0K 0 vm_fictitious 0 0K 0 DEVFS2 0 0K 0 gntdev 0 0K 0 privcmd_dev 0 0K 0 evtchn_dev 0 0K 0 xenstore 0 0K 0 scsi_pass 0 0K 0 ciss_data 0 0K 0 xnb 0 0K 0 xen_acpi 0 0K 0 xbbd 0 0K 0 xbd 0 0K 0 UMAHash 0 0K 0 Balloon 0 0K 0 sysmouse 0 0K 0 vm_pgdata 0 0K 0 jblocks 0 0K 0 savedino 0 0K 92083 sentinel 0 0K 0 jfsync 0 0K 0 jtrunc 0 0K 0 sbdep 0 0K 116 jsegdep 0 0K 0 jseg 0 0K 0 jfreefrag 0 0K 0 jfreeblk 0 0K 0 jnewblk 0 0K 0 jmvref 0 0K 0 jremref 0 0K 0 jaddref 0 0K 0 freedep 0 0K 0 freefrag 0 0K 148 allocindir 0 0K 0 indirdep 0 0K 57448 allocdirect 0 0K 0 ufs_trim 0 0K 0 mactemp 0 0K 0 audit_trigger 0 0K 0 audit_pipe_presel 0 0K 0 audit_pipeent 0 0K 0 audit_pipe 0 0K 0 audit_evname 0 0K 0 audit_bsm 0 0K 0 audit_gidset 0 0K 0 audit_text 0 0K 0 audit_path 0 0K 0 audit_data 0 0K 0 audit_cred 0 0K 0 vtfont 0 0K 0 BACKLIGHT 0 0K 0 ath_hal 0 0K 0 athdev 0 0K 0 ata_pci 0 0K 0 ata_dma 0 0K 0 ata_generic 0 0K 0 pvscsi 0 0K 0 scsi_da 0 0K 69 ata_da 0 0K 0 scsi_ch 0 0K 0 scsi_cd 0 0K 0 ktls_ocf 0 0K 0 AHCI driver 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5E_TLS_RX 0 0K 0 MLX5EEPROM 0 0K 0 MLX5E_TLS 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EN 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5DUMP 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 MLX5EEPROM 0 0K 0 seq_file 0 0K 0 lkpiskb 0 0K 0 radix 0 0K 0 idr 0 0K 0 lkpindev 0 0K 0 lkpifw 0 0K 0 lkpi80211 0 0K 0 NLM 0 0K 0 ipsec-spdcache 0 0K 0 ipsec-reg 0 0K 0 ipsec-misc 0 0K 0 ipsecrequest 0 0K 0 ip6opt 0 0K 842 ip6_msource 0 0K 0 ip6_moptions 0 0K 0 in6_mfilter 0 0K 0 frag6 0 0K 0 tcplog 0 0K 0 tcp_hwpace 0 0K 0 USBdev 0 0K 0 USB 0 0K 0 LRO 0 0K 0 ip_moptions 0 0K 27 in_mfilter 0 0K 6 ipid 0 0K 0 80211scan 0 0K 0 80211ratectl 0 0K 0 80211power 0 0K 0 80211nodeie 0 0K 0 80211node 0 0K 0 80211mesh_gt 0 0K 0 80211mesh_rt 0 0K 0 80211perr 0 0K 0 80211prep 0 0K 0 80211preq 0 0K 0 80211dfs 0 0K 0 80211crypto 0 0K 0 80211vap 0 0K 0 iflib 0 0K 0 vlan 0 0K 0 gif 0 0K 0 ifdescr 0 0K 0 zlib 0 0K 0 fadvise 0 0K 191 VN POLL 0 0K 0 agp 0 0K 0 statfs 0 0K 84964 namei_tracker 0 0K 3 export_host 0 0K 0 cl_savebuf 0 0K 3 nvme_da 0 0K 0 acpipwr 0 0K 0 acpi_perf 0 0K 0 twsbuf 0 0K 0 twe_commands 0 0K 0 tcp_log_dev 0 0K 7 midi buffers 0 0K 0 mixer 0 0K 0 ac97 0 0K 0 hdacc 0 0K 0 hdac 0 0K 0 hdaa 0 0K 0 acpicmbat 0 0K 0 SIIS driver 0 0K 0 CAM CCB 0 0K 523 biobuf 0 0K 0 aios 0 0K 39 lio 0 0K 211 acl 0 0K 0 mbuf_tag 0 0K 435 ktls 0 0K 0 PUC 0 0K 0 ppbusdev 0 0K 0 agtiapi_MemAlloc malloc 0 0K 0 osti_cacheable 0 0K 0 tempbuff 0 0K 0 tempbuff 0 0K 0 ag_tgt_map_t malloc 0 0K 0 ag_slr_map_t malloc 0 0K 0 lDevFlags * malloc 0 0K 0 tiDeviceHandle_t * malloc 0 0K 0 ag_portal_data_t malloc 0 0K 0 ag_device_t malloc 0 0K 0 STLock malloc 0 0K 0 CCB List 0 0K 0 sr_iov 0 0K 0 OCS 0 0K 0 OCS 0 0K 0 nvme 0 0K 0 nvd 0 0K 0 netmap 0 0K 0 mwldev 0 0K 0 MVS driver 0 0K 0 CAM ccb queue 0 0K 0 accf 0 0K 0 pts 0 0K 0 iov 0 0K 75458 ioctlops 0 0K 12415 Witness 0 0K 0 stack 0 0K 0 mrsasbuf 0 0K 0 mpt_user 0 0K 0 mps_user 0 0K 0 MPSSAS 0 0K 0 mps 0 0K 0 sbuf 0 0K 294 mpr_user 0 0K 0 firmware 0 0K 0 compressor 0 0K 0 MPRSAS 0 0K 0 SWAP 0 0K 0 mpr 0 0K 0 mfibuf 0 0K 0 sysctltmp 0 0K 1625 sysctl 0 0K 3 md_sectors 0 0K 0 ekcd 0 0K 0 dumper 0 0K 0 sendfile 0 0K 0 rctl 0 0K 0 md_disk 0 0K 0 malodev 0 0K 0 LED 0 0K 0 ix_sriov 0 0K 0 cache 0 0K 0 aacraidcam 0 0K 0 prison_racct 0 0K 0 Fail Points 0 0K 0 sigio 0 0K 1 filedesc_to_leader 0 0K 0 pwd 0 0K 0 tty console 0 0K 0 ix 0 0K 0 ipsbuf 0 0K 0 aacraid_buf 0 0K 0 aaccam 0 0K 0 boottrace 0 0K 0 aacbuf 0 0K 0 zstd 0 0K 0 XZ_DEC 0 0K 0 nvlist 0 0K 0 SCSI ENC 0 0K 0 SCSI sa 0 0K 0 isofs_node 0 0K 0 isofs_mount 0 0K 0 tr_raid5_data 0 0K 0 tr_raid1e_data 0 0K 0 tr_raid1_data 0 0K 0 tr_raid0_data 0 0K 0 tr_concat_data 0 0K 0 md_sii_data 0 0K 0 md_promise_data 0 0K 0 md_nvidia_data 0 0K 0 md_jmicron_data 0 0K 0 md_intel_data 0 0K 0 md_ddf_data 0 0K 0 raid_data 0 0K 72 geom_flashmap 0 0K 0 tmpfs dir 0 0K 0 tmpfs name 0 0K 0 tmpfs mount 0 0K 0 NFS FHA 0 0K 0 newnfsmnt 0 0K 0 newnfsclient_req 0 0K 0 db> show uma Zone Size Used Free Requests Sleeps Bucket Total Mem XFree mbuf_jumbo_page 4096 8353 1299 1730014 0 254 39534592 0 FFS inode 1160 22543 39 108512 0 8 26195120 0 VNODE 448 22586 94 108562 0 30 10160640 0 mbuf 256 9048 29807 8084342 0 254 9946880 0 FFS2 dinode 256 22543 92 108512 0 62 5794560 0 sctp_asoc 2256 238 1542 37120 0 254 4015680 0 S VFS Cache 104 33638 409 122929 0 126 3540888 0 malloc-2048 2048 281 1279 141780 0 8 3194880 0 RADIX NODE 144 20706 429 1732703 0 63 3043440 0 sctp_ep 1208 280 2010 141738 0 254 2766320 0 mbuf_cluster 2048 1270 0 1270 0 254 2600960 0 pbuf 2624 0 989 0 0 2 2595136 0 tcp_log 416 0 5094 10057 0 254 2119104 0 vmem btag 56 35633 118 35830 0 254 2002056 0 malloc-4096 4096 432 10 83568 0 3 1810432 0 BUF TRIE 144 248 11540 110741 0 62 1697472 0 malloc-384 384 4117 53 4117 0 30 1601280 0 sctp_chunk 152 238 10188 17399 0 254 1584752 0 malloc-128 128 11608 389 184051 0 126 1535616 0 malloc-1024 1024 246 1222 37835 0 16 1503232 0 UMA Slabs 0 112 12816 66 12941 0 126 1442784 0 VM OBJECT 264 5269 161 1775840 0 30 1433520 0 sctp_raddr 736 238 1544 37444 0 254 1311552 0 malloc-384 384 518 2742 179144 0 30 1251840 0 malloc-384 384 844 2156 91703 0 30 1152000 0 256 Bucket 2048 466 42 29015 0 8 1040384 0 socket 960 120 896 177715 0 254 975360 0 malloc-16384 16384 51 4 80467 0 1 901120 0 malloc-256 256 865 2240 264850 0 62 794880 0 ertt_txseginfo 40 0 19392 4914414 0 254 775680 0 malloc-256 256 51 2979 184852 0 62 775680 0 malloc-128 128 2062 2371 207917 0 126 567424 0 tcpcb 1104 36 475 25064 0 254 564144 0 malloc-256 256 558 1557 143252 0 62 541440 0 MAP ENTRY 96 4724 568 4140485 0 126 508032 0 THREAD 1808 205 26 103507 0 8 417648 0 lkpimm 168 1 2327 1 0 62 391104 0 lkpicurr 168 2 2326 2 0 62 391104 0 DIRHASH 1024 311 9 311 0 16 327680 0 mbuf_packet 256 290 980 145176 0 254 325120 0 malloc-64 64 4286 565 169707 0 254 310464 0 tcp_bbr_map 128 4 2166 245728 0 126 277760 0 malloc-65536 65536 4 0 4 0 1 262144 0 malloc-32768 32768 1 7 54514 0 1 262144 0 malloc-16 16 14732 518 191436 0 254 244000 0 VMSPACE 2552 78 12 81952 0 4 229680 0 DEVCTL 1024 0 220 225 0 0 225280 0 FPU_save_area 832 207 36 118343 0 16 202176 0 malloc-32 32 5439 735 48115 0 254 197568 0 UMA Zones 768 244 0 244 0 16 187392 0 malloc-128 128 1251 144 5122 0 126 178560 0 128 Bucket 1024 110 49 18367 0 16 162816 0 PROC 1352 103 17 81987 0 8 162240 0 sctp_stream_msg_out 112 34 1262 6772 0 254 145152 0 filedesc0 1072 104 29 82171 0 8 142576 0 64 Bucket 512 175 89 78261 0 30 135168 0 malloc-65536 65536 2 0 2 0 1 131072 0 malloc-65536 65536 2 0 2 0 1 131072 0 malloc-65536 65536 0 2 1138 0 1 131072 0 malloc-65536 65536 0 2 9 0 1 131072 0 malloc-65536 65536 0 2 8 0 1 131072 0 malloc-1024 1024 114 14 146 0 16 131072 0 unpcb 256 20 490 2066 0 254 130560 0 malloc-32 32 543 3363 184942 0 254 124992 0 ksiginfo 112 111 933 15912 0 126 116928 0 malloc-64 64 245 1582 41034 0 254 116928 0 32 Bucket 256 210 225 39379 0 62 111360 0 malloc-4096 4096 23 3 575 0 2 106496 0 malloc-2048 2048 7 41 2215 0 8 98304 0 g_bio 408 0 240 787889 0 30 97920 0 pipe 744 23 107 5332 0 16 96720 0 malloc-256 256 250 125 120845 0 62 96000 0 tcp_inpcb 424 36 180 25064 0 30 91584 0 UMA Kegs 384 230 3 230 0 30 89472 0 malloc-64 64 514 809 51847 0 254 84672 0 malloc-4096 4096 14 6 85020 0 2 81920 0 malloc-256 256 39 276 126190 0 62 80640 0 sctp_readq 152 0 520 249 0 254 79040 0 malloc-8192 8192 4 5 133 0 1 73728 0 malloc-8192 8192 5 4 134 0 1 73728 0 malloc-64 64 292 779 1196427 0 254 68544 0 malloc-128 128 299 228 713 0 126 67456 0 malloc-65536 65536 1 0 1 0 1 65536 0 malloc-32768 32768 1 1 121 0 1 65536 0 malloc-32768 32768 2 0 2 0 1 65536 0 malloc-32768 32768 0 2 3 0 1 65536 0 malloc-32768 32768 0 2 20 0 1 65536 0 malloc-8192 8192 4 4 90 0 1 65536 0 malloc-256 256 79 176 81616 0 62 65280 0 malloc-256 256 63 192 89444 0 62 65280 0 udplite_inpcb 424 0 153 4245 0 30 64872 0 udp_inpcb 424 6 147 1617 0 30 64872 0 sctp_laddr 48 153 1191 72852 0 254 64512 0 Files 80 318 482 337499 0 126 64000 0 malloc-16 16 806 3194 74841 0 254 64000 0 malloc-16 16 529 3471 179806 0 254 64000 0 malloc-384 384 142 8 403 0 30 57600 0 malloc-8192 8192 5 2 314 0 1 57344 0 ripcb 424 5 121 2844 0 30 53424 0 malloc-64 64 487 332 709 0 254 52416 0 malloc-128 128 246 157 955 0 126 51584 0 malloc-128 128 102 301 81073 0 126 51584 0 malloc-128 128 10 393 1039 0 126 51584 0 malloc-256 256 159 36 444 0 62 49920 0 NAMEI 1024 0 48 478242 0 16 49152 0 malloc-16384 16384 3 0 3 0 1 49152 0 malloc-2048 2048 9 15 831 0 8 49152 0 malloc-512 512 37 59 103 0 30 49152 0 tcp_rack_pcb 896 2 52 8949 0 16 48384 0 16 Bucket 144 141 195 9327 0 62 48384 0 da_ccb 544 0 84 197077 0 16 45696 0 tcp_bbr_pcb 832 2 52 7807 0 16 44928 0 syncache 168 0 264 4 0 254 44352 0 8 Bucket 80 178 372 23149 0 126 44000 0 TURNSTILE 136 232 83 232 0 62 42840 0 clpbuf 2624 0 16 36 0 16 41984 0 malloc-4096 4096 9 1 9 0 2 40960 0 pcpu-8 8 4741 379 12711 0 254 40960 0 Mountpoints 2752 2 12 2 0 4 38528 0 hostcache 64 2 565 2 0 254 36288 0 malloc-64 64 35 532 101 0 254 36288 0 malloc-64 64 147 420 2081 0 254 36288 0 malloc-64 64 136 431 307 0 254 36288 0 malloc-128 128 80 199 369 0 126 35712 0 routing nhops 256 27 108 59 0 62 34560 0 ttyoutq 256 72 63 160 0 62 34560 0 malloc-384 384 53 37 394 0 30 34560 0 SLEEPQUEUE 88 232 152 232 0 126 33792 0 malloc-8192 8192 2 2 4 0 1 32768 0 malloc-4096 4096 3 5 330 0 2 32768 0 malloc-2048 2048 1 15 7968 0 8 32768 0 malloc-2048 2048 8 8 13 0 8 32768 0 malloc-2048 2048 2 14 460 0 8 32768 0 malloc-2048 2048 5 11 492 0 8 32768 0 malloc-1024 1024 3 29 22 0 16 32768 0 malloc-1024 1024 10 22 2717 0 16 32768 0 malloc-1024 1024 18 14 22 0 16 32768 0 malloc-1024 1024 5 27 612 0 16 32768 0 malloc-1024 1024 8 24 9 0 16 32768 0 malloc-1024 1024 9 23 851 0 16 32768 0 malloc-512 512 2 62 186 0 30 32768 0 malloc-512 512 2 62 239 0 30 32768 0 malloc-512 512 1 63 10 0 30 32768 0 malloc-512 512 12 52 136 0 30 32768 0 malloc-512 512 0 64 1006 0 30 32768 0 malloc-512 512 0 64 547 0 30 32768 0 pcpu-64 64 493 19 493 0 254 32768 0 KNOTE 160 28 172 644870 0 62 32000 0 ttyinq 160 135 65 300 0 62 32000 0 tcp_rack_map 120 4 260 14608 0 126 31680 0 L VFS Cache 320 71 25 73 0 30 30720 0 cpuset 104 7 272 2588 0 126 29016 0 udp_inpcb ports 32 3 879 565 0 254 28224 0 tcp_inpcb ports 32 4 878 14124 0 254 28224 0 ertt 72 36 356 25064 0 126 28224 0 PWD 32 58 824 88610 0 254 28224 0 malloc-32 32 182 700 80674 0 254 28224 0 malloc-32 32 293 589 69861 0 254 28224 0 4 Bucket 48 11 577 2188 0 254 28224 0 2 Bucket 32 66 816 16129 0 254 28224 0 AIO 208 3 130 406 0 62 27664 0 malloc-8192 8192 3 0 3 0 1 24576 0 malloc-8192 8192 2 1 3 0 1 24576 0 rtentry 176 31 107 59 0 62 24288 0 PGRP 88 35 241 248 0 126 24288 0 rl_entry 40 131 475 131 0 254 24240 0 itimer 352 0 66 23 0 30 23232 0 malloc-384 384 27 33 42 0 30 23040 0 malloc-384 384 2 58 1071 0 30 23040 0 domainset 40 0 567 1935 0 254 22680 0 udpcb 32 6 624 5862 0 254 20160 0 udplite_inpcb ports 32 0 630 303 0 254 20160 0 malloc-32 32 63 567 185 0 254 20160 0 malloc-32 32 0 630 6 0 254 20160 0 malloc-32 32 420 210 2268 0 254 20160 0 malloc-32 32 40 590 739 0 254 20160 0 cryptop 280 0 70 30 0 30 19600 0 AIOCB 552 0 35 774 0 16 19320 0 AIOLIO 272 0 70 211 0 30 19040 0 epoch_record pcpu 256 4 60 4 0 62 16384 0 malloc-16384 16384 1 0 1 0 1 16384 0 malloc-16384 16384 0 1 4 0 1 16384 0 malloc-4096 4096 2 2 258 0 2 16384 0 malloc-4096 4096 0 4 8 0 2 16384 0 malloc-2048 2048 1 7 1 0 8 16384 0 SMR CPU 32 7 504 7 0 254 16352 0 tcpreass 48 0 336 2 0 254 16128 0 vtnet_tx_hdr 24 0 668 929576 0 254 16032 0 malloc-16 16 81 919 25150 0 254 16000 0 kenv 258 15 45 1080 0 30 15480 0 mqnode 416 3 33 3 0 30 14976 0 vmem 1856 1 7 1 0 8 14848 0 SMR SHARED 24 7 504 7 0 254 12264 0 AIOP 32 4 374 4 0 254 12096 0 malloc-16 16 18 732 154 0 254 12000 0 malloc-16 16 185 565 3103 0 254 12000 0 malloc-16 16 31 719 139529 0 254 12000 0 pcpu-16 16 14 498 14 0 254 8192 0 malloc-16 16 1 499 1 0 254 8000 0 UMA Slabs 1 176 10 12 10 0 62 3872 0 KMAP ENTRY 96 12 27 14 0 0 3744 0 pcpu-4 4 1 511 415 0 254 2048 0 FFS1 dinode 128 0 0 0 0 126 0 0 ada_ccb 272 0 0 0 0 30 0 0 swblk 136 0 0 0 0 62 0 0 swpctrie 144 0 0 0 0 62 0 0 cdg_qdiffsample 16 0 0 0 0 254 0 0 pf state scrubs 40 0 0 0 0 254 0 0 pf frag entries 40 0 0 0 0 254 0 0 pf frags 248 0 0 0 0 62 0 0 pf table entries 160 0 0 0 0 254 0 0 pf table entry counters 64 0 0 0 0 254 0 0 pf source nodes 136 0 0 0 0 254 0 0 pf state keys 88 0 0 0 0 126 0 0 pf states 312 0 0 0 0 0 0 0 pf tags 104 0 0 0 0 126 0 0 pf mtags 184 0 0 0 0 62 0 0 tfo_ccache_entries 80 0 0 0 0 126 0 0 tfo 4 0 0 0 0 254 0 0 sackhole 32 0 0 0 0 254 0 0 tcptw 72 0 0 0 0 254 0 0 ipq 56 0 0 0 0 254 0 0 sctp_asconf_ack 48 0 0 0 0 254 0 0 sctp_asconf 40 0 0 0 0 254 0 0 tcp_log_id_node 120 0 0 0 0 126 0 0 tcp_log_id_bucket 176 0 0 0 0 62 0 0 ripcb ports 32 0 0 0 0 254 0 0 IPsec SA lft_c 16 0 0 0 0 254 0 0 mqnotifier 216 0 0 0 0 62 0 0 mvdata 64 0 0 0 0 254 0 0 mqueue 248 0 0 0 0 62 0 0 TMPFS node 224 0 0 0 0 62 0 0 NCLNODE 608 0 0 0 0 16 0 0 LTS VFS Cache 360 0 0 0 0 30 0 0 STS VFS Cache 144 0 0 0 0 62 0 0 linux_dma_object 32 0 0 0 0 254 0 0 linux_dma_pctrie 144 0 0 0 0 62 0 0 IOMMU_MAP_ENTRY 120 0 0 0 0 126 0 0 mbuf_jumbo_16k 16384 0 0 0 0 254 0 0 mbuf_jumbo_9k 9216 0 0 0 0 254 0 0 audit_record 1280 0 0 0 0 8 0 0 MAC labels 40 0 0 0 0 254 0 0 vnpbuf 2624 0 0 0 0 64 0 0 mdpbuf 2624 0 0 0 0 3 0 0 nfspbuf 2624 0 0 0 0 16 0 0 swwbuf 2624 0 0 0 0 8 0 0 swrbuf 2624 0 0 0 0 16 0 0 umtx_shm 88 0 0 0 0 126 0 0 umtx pi 96 0 0 0 0 126 0 0 rangeset pctrie nodes 144 0 0 0 0 62 0 0 malloc-65536 65536 0 0 0 0 1 0 0 malloc-32768 32768 0 0 0 0 1 0 0 malloc-32768 32768 0 0 0 0 1 0 0 malloc-32768 32768 0 0 0 0 1 0 0 malloc-16384 16384 0 0 0 0 1 0 0 malloc-16384 16384 0 0 0 0 1 0 0 malloc-16384 16384 0 0 0 0 1 0 0 malloc-16384 16384 0 0 0 0 1 0 0 malloc-8192 8192 0 0 0 0 1 0 0 malloc-4096 4096 0 0 0 0 2 0 0 malloc-512 512 0 0 0 0 30 0 0 malloc-384 384 0 0 0 0 30 0 0 pcpu-32 32 0 0 0 0 254 0 0 fakepg 104 0 0 0 0 126 0 0 UMA Hash 256 0 0 0 0 62 0 0