6000600000008000900ff7f0000140001005fc1cba8bf7edda1dcd73ee4d0868d24"], 0xc0}, 0x1, 0x0, 0x0, 0x4048055}, 0x10) 14:54:12 executing program 1 (fault-call:7 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f0000343000/0x2000)=nil, 0x2000, 0x2000000000000d) r2 = fcntl$dupfd(r0, 0x406, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000000)={0x18, 0x0, 0x2, {0x776b}}, 0x18) 14:54:12 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280), &(0x7f0000000080)=0x8) syz_execute_func(&(0x7f0000000140)="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") setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f00000000c0)=""/37, 0x8000, 0x0, 0x4}, 0x18) [ 842.175827] FAULT_INJECTION: forcing a failure. [ 842.175827] name failslab, interval 1, probability 0, space 0, times 0 [ 842.187384] CPU: 0 PID: 26280 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 842.194794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.197269] Call Trace: [ 842.197269] dump_stack+0x173/0x1d0 [ 842.197269] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 842.197269] ? __should_failslab+0x266/0x290 [ 842.197269] should_fail+0xa19/0xb20 [ 842.197269] __should_failslab+0x266/0x290 [ 842.197269] should_failslab+0x29/0x70 [ 842.197269] kmem_cache_alloc_trace+0x125/0xb50 [ 842.197269] ? sctp_add_bind_addr+0x12f/0x730 [ 842.197269] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 842.197269] sctp_add_bind_addr+0x12f/0x730 [ 842.197269] sctp_copy_local_addr_list+0x4e7/0x660 [ 842.197269] ? sctp_v4_inaddr_any+0xd0/0xd0 [ 842.197269] sctp_copy_one_addr+0x1f5/0xce0 [ 842.197269] sctp_bind_addr_copy+0x22d/0x8a0 [ 842.197269] sctp_assoc_set_bind_addr_from_ep+0x219/0x270 [ 842.197269] sctp_sendmsg+0x4081/0x5ae0 [ 842.197269] ? release_sock+0x23b/0x2a0 [ 842.197269] ? sctp_getsockopt+0x185c0/0x185c0 [ 842.197269] inet_sendmsg+0x54a/0x720 [ 842.197269] ___sys_sendmsg+0xdb3/0x1220 [ 842.197269] ? inet_getname+0x490/0x490 [ 842.197269] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 842.197269] ? __fget_light+0x6e1/0x750 [ 842.197269] __se_sys_sendmsg+0x305/0x460 [ 842.197269] __x64_sys_sendmsg+0x4a/0x70 [ 842.197269] do_syscall_64+0xbc/0xf0 [ 842.197269] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 842.197269] RIP: 0033:0x458da9 [ 842.197269] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 842.197269] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 842.197269] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 842.197269] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20000000000a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x638, 0x230, 0x0, 0x0, 0x450, 0x360, 0x568, 0x568, 0x568, 0x568, 0x568, 0x6, &(0x7f0000000040), {[{{@ipv6={@mcast2, @loopback, [0x0, 0xffffffff, 0xff0000ff, 0xff000000], [0x0, 0x0, 0xffffff00, 0xffffffff], 'eql\x00', 'team_slave_0\x00', {0xff}, {}, 0x2c, 0x3ff, 0x5, 0x8}, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, [], 0x1c}, @ipv6=@mcast2, 0x28, 0xc, 0xfffffffffffffe00}}}, {{@ipv6={@remote, @rand_addr="46d68868895d0ac7686673f080e45fc0", [0xff000000, 0xff000000, 0xff0000ff, 0xff], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'rose0\x00', 'team_slave_1\x00', {}, {0xff}, 0x4, 0x1000000, 0x1, 0x1}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0xaf70, 0x7f, 0x1, 0x2, 0x1}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x3}}}, {{@ipv6={@mcast1, @local, [0xffffff00, 0xffffff00, 0xffffff00, 0xff000000], [0xffffffff, 0xff000000, 0xffffffff, 0xffffffff], 'rose0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x0, 0x1aee, 0x5, 0x36}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@unspec=@connlabel={0x28, 'connlabel\x00', 0x0, {0x20, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x80, 0x10, "ae7e5161ab388b7283c9a16e781a182471231e0c8ec114a27009c15f2e08"}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x698) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f00000006c0)=@raw={'\x05\x00\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18\x00\x00\x00\x03\x03\x00\x00\x00\xff?\x00', 0x9, 0x3, 0x1, 0x0, 0x0, 0x0, 0x108, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xfffffffffffffe56, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "c14000e57af108cc6c74028119fb719d84b855ae79c03bcd889e253bc457"}}, {{@ipv6={@mcast1, @mcast1, [], [], 'bridge_slave_0\x00', 'vcan0\x00'}, 0x0, 0x3d8, 0x349}, @common=@inet=@TCPMSS={0x0, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xfffffcb6}, {0x28}}}}, 0x119) 14:54:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) [ 842.197269] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 842.197269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 842.197269] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf8, r2, 0x110, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7e1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x71c}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="b8e8f8ef239fd75051fc37d5abeff173"}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1efa}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40005}, 0x8810) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000002c0)={0x8, 0x8001}) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000440)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r3, 0x20400000, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000640)) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffffd833, 0xa00) 14:54:12 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.121951] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.121951] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 843.121951] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000fc0)='cgroup.stat\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/\xc34') lseek(r1, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x9, 0x800, [], &(0x7f0000000000)=0x8}) accept4$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000140)=0x1c, 0x800) [ 843.121951] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 843.121951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 843.121951] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:13 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:13 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280), &(0x7f0000000080)=0x8) syz_execute_func(&(0x7f0000000140)="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") setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f00000000c0)=""/37, 0x8000, 0x0, 0x4}, 0x18) 14:54:13 executing program 1 (fault-call:7 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:13 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8100, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) close(r1) close(r3) 14:54:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xec, "c3461e08988671520e9be12f36dccb53327902692278428387d7d1638391742233951826bcf82d81cc03219a9b5e5c648ed69e9d9983a55d44149adae0513bc73a53a37d45f18d89bad3ba4a52147899c147f60e455b56948fc1224c7af0e0678b6a1ec356e78edc0a18d6e76fa30b74a8d4f4bbd6e2a6e4dc2746af830ed5a2b85dca2f88239cac3ecfd992795b44626a9d4d9c0b4808e72eefd59a81ffcd4714df26956746a9ca51d468d36ef3d99ec299271c62d2664480291eeea75d9c0701dec445ad54c7a1d10cc48dcf4cb0ec353d08c9cf91065e6695e45c466f0cf1a3c815bb2ed6da06d01c19ff"}, &(0x7f00000001c0)=0xf4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000300)={r4, 0xdc, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x1ff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e23, 0x1, @mcast1, 0x1}, @in6={0xa, 0x4e21, 0x1ff, @mcast1, 0x2}, @in6={0xa, 0x4e20, 0x27f4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x401}}, 0x662}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e20, 0x5, @mcast2, 0xffff}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000340)=0x10) [ 843.834024] FAULT_INJECTION: forcing a failure. [ 843.834024] name failslab, interval 1, probability 0, space 0, times 0 [ 843.845584] CPU: 1 PID: 26339 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 843.852827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.855393] Call Trace: [ 843.855393] dump_stack+0x173/0x1d0 [ 843.855393] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 843.855393] ? __should_failslab+0x266/0x290 [ 843.855393] should_fail+0xa19/0xb20 [ 843.855393] __should_failslab+0x266/0x290 [ 843.855393] should_failslab+0x29/0x70 [ 843.855393] kmem_cache_alloc_trace+0x125/0xb50 [ 843.855393] ? sctp_add_bind_addr+0x12f/0x730 [ 843.855393] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 843.855393] sctp_add_bind_addr+0x12f/0x730 [ 843.855393] sctp_copy_local_addr_list+0x4e7/0x660 [ 843.855393] ? sctp_v4_inaddr_any+0xd0/0xd0 [ 843.855393] sctp_copy_one_addr+0x1f5/0xce0 [ 843.855393] sctp_bind_addr_copy+0x22d/0x8a0 [ 843.855393] sctp_assoc_set_bind_addr_from_ep+0x219/0x270 [ 843.855393] sctp_sendmsg+0x4081/0x5ae0 [ 843.855393] ? release_sock+0x23b/0x2a0 [ 843.855393] ? sctp_getsockopt+0x185c0/0x185c0 [ 843.855393] inet_sendmsg+0x54a/0x720 [ 843.855393] ___sys_sendmsg+0xdb3/0x1220 [ 843.855393] ? inet_getname+0x490/0x490 [ 843.855393] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 843.855393] ? __fget_light+0x6e1/0x750 [ 843.855393] __se_sys_sendmsg+0x305/0x460 [ 843.855393] __x64_sys_sendmsg+0x4a/0x70 [ 843.855393] do_syscall_64+0xbc/0xf0 [ 843.855393] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 843.855393] RIP: 0033:0x458da9 [ 843.855393] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.855393] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.855393] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 843.855393] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 843.855393] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 843.855393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 843.855393] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f00000000c0)) write$P9_RUNLINKAT(r0, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x3f, 0x8, 0x9, 0x7, 0x8, 0x3}) lseek(r1, 0x20400000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:14 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:14 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r2 = openat$cgroup_type(r0, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_int(r2, 0x0, 0x0) 14:54:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.755290] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 844.755290] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 844.755290] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 844.755290] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 844.755290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 844.755290] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x6, 0x3, 0x7fff, 0x6, 0x0, 0x8, 0x3, 0x4}}) ioctl(r1, 0x11000008911, &(0x7f0000000140)="0aeb28daa1f04925b7d070") setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000480)=0x10, 0x4) r2 = socket(0x10, 0x803, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000002c0)={r2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x150100a}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="80000000", @ANYRES16=r3, @ANYBLOB="040026bd7000ffdbdf25060000002800060008000100020029000800010003000000080001000600000004000200080001000200000024ee0800080002000080000008000200070000000800014001040000081d010004000000200007000800010001000000080c00040003000000000000000000000000000057869ad22b39f815feaac5dd6ad756dcb9298bf6a577c94cc4b92cf9deacf06ca1b1096899c194be7acb4daa545d4ab3d0a5159a4993aa21d5eb57dc"], 0x80}, 0x1, 0x0, 0x0, 0x4008851}, 0xc0) write(r2, &(0x7f0000003940)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080008000d000000", 0x24) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000180)={0x1, 0x0, {0x660, 0x7, 0x0, 0xf, 0xf, 0x7, 0x0, 0x6}}) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000280)=0x1) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) 14:54:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000340)=@nfc={0x27, 0x1}, 0x7b, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000000000000000000000000000c6712094d9db88a041cd30ce04dd7046f0604332449a8fe1dc2541127e49fc426f0"], 0x8}}], 0x68c207f087db26b4, 0x0) 14:54:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.748410] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 845.748410] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 845.748410] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 845.748410] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 845.748410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 845.748410] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:16 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000005) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='>', 0x1}], 0x1) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000100)={0x5, 0x8, 0x3f6, 0x10000, 0x100}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TCXONC(r3, 0x540a, 0x1) 14:54:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r0, 0x0, 0xfffffffffffffd3d, 0x0, &(0x7f0000000000)={0xa, 0x8000000000004e28, 0x0, @remote}, 0x198b4c8950d72a42) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000380), 0x4) recvmsg(r0, &(0x7f0000000400)={&(0x7f00000002c0)=@nl=@proc, 0x80, 0x0}, 0x2000) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1d, 0x200) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x9, 0x8) 14:54:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) openat$cgroup_ro(r0, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06us\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)='][\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00eg\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdalHw\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.006852] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 847.006852] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 847.006852] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:17 executing program 3: unshare(0x20400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x402172, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc074510c, 0x0) r1 = semget(0x3, 0x7, 0x40) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000100)={0x75, 0x9, 0x8, 0x7, 0x3, 0x43, 0x8, 0x80000000, 0x9, 0x3, 0x3f, 0x4, 0xc45, 0x1, &(0x7f0000000000)=""/177, 0x8, 0x7, 0x3f}) [ 847.006852] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 847.006852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 847.006852] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r4 = getuid() r5 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) r7 = gettid() msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{0xb9, r2, r3, r4, r5, 0x8, 0x6}, 0xfffffffffffff000, 0x81, 0x8, 0x7, 0x1ff, 0x446, r6, r7}) r8 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000480)='x', 0x1, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r8, r9, r8}, &(0x7f0000000600)=""/83, 0x362, &(0x7f00000001c0)={&(0x7f0000000040)={'md4-generic\x00'}, &(0x7f0000000100)}) 14:54:17 executing program 1 (fault-call:7 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.802649] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 847.802649] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 847.802649] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:17 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getsig(0x4202, r1, 0xee, &(0x7f0000000040)) r2 = openat$cgroup_int(r0, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) r3 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x3, 0x800) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000200)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2, 0x0) write$binfmt_aout(r2, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0) 14:54:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) [ 847.802649] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 847.802649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 847.802649] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = shmget(0x2, 0x4000, 0x410, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x4000) renameat(r2, &(0x7f0000000100)='.\x00', r3, &(0x7f0000000240)='./file0\x00') ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000140)={0x6, 0x5, 0xffff, 0x1, 0x10, 0x3ec5c6c9}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000200)={0x8, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff, 0x1000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xc00, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x14}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:54:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x804}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@gettclass={0x24, 0x2a, 0x300, 0x70bd25, 0x25dfdbfb, {0x0, r1, {0xf, 0x8}, {0x0, 0xffff}, {0x3}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x50) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x3, 0x161, 0x9, 0x1, 0x1, 0x3cb0, 0x3ff, 0x7, 0x401, 0x3, 0x1, 0x7}) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:18 executing program 1 (fault-call:7 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) [ 848.275531] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:54:18 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000000)=0x9, 0x6, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000040)=0x7fffffff, 0x7fff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400200, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x8, 0x200, 0x3, 0x5, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x20000000000000, 0x8}, 0x8) 14:54:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) [ 848.475097] FAULT_INJECTION: forcing a failure. [ 848.475097] name failslab, interval 1, probability 0, space 0, times 0 [ 848.486582] CPU: 1 PID: 26513 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 848.493837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.496407] Call Trace: [ 848.496407] dump_stack+0x173/0x1d0 [ 848.496407] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 848.496407] ? __should_failslab+0x266/0x290 [ 848.496407] should_fail+0xa19/0xb20 [ 848.496407] __should_failslab+0x266/0x290 [ 848.496407] should_failslab+0x29/0x70 [ 848.496407] kmem_cache_alloc_trace+0x125/0xb50 [ 848.496407] ? sctp_add_bind_addr+0x12f/0x730 [ 848.496407] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 848.496407] sctp_add_bind_addr+0x12f/0x730 [ 848.496407] sctp_copy_local_addr_list+0x4e7/0x660 [ 848.496407] ? sctp_v4_inaddr_any+0xd0/0xd0 [ 848.496407] sctp_copy_one_addr+0x1f5/0xce0 [ 848.496407] sctp_bind_addr_copy+0x22d/0x8a0 [ 848.496407] sctp_assoc_set_bind_addr_from_ep+0x219/0x270 [ 848.496407] sctp_sendmsg+0x4081/0x5ae0 [ 848.496407] ? release_sock+0x23b/0x2a0 [ 848.580893] ? sctp_getsockopt+0x185c0/0x185c0 [ 848.580893] inet_sendmsg+0x54a/0x720 [ 848.580893] ___sys_sendmsg+0xdb3/0x1220 [ 848.592607] ? inet_getname+0x490/0x490 [ 848.592607] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 848.592607] ? __fget_light+0x6e1/0x750 [ 848.592607] __se_sys_sendmsg+0x305/0x460 [ 848.610802] __x64_sys_sendmsg+0x4a/0x70 [ 848.610802] do_syscall_64+0xbc/0xf0 [ 848.610802] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 848.610802] RIP: 0033:0x458da9 [ 848.610802] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 848.610802] RSP: 002b:00007f150ac54c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 848.610802] RAX: ffffffffffffffda RBX: 00007f150ac54c90 RCX: 0000000000458da9 [ 848.610802] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 14:54:18 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0xfffffffffffffcad, 0x1, 0x61ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40}) memfd_create(&(0x7f0000000100)='![GPLem0md5sum(\'\x00', 0x4) io_setup(0x3, &(0x7f0000000140)=0x0) io_destroy(r0) [ 848.610802] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 848.610802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac556d4 [ 848.610802] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 14:54:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 849.143550] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 849.143550] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 849.143550] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) [ 849.143550] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 849.143550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 849.143550] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:19 executing program 1 (fault-call:7 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) [ 849.541937] FAULT_INJECTION: forcing a failure. [ 849.541937] name failslab, interval 1, probability 0, space 0, times 0 [ 849.553444] CPU: 1 PID: 26545 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 849.560695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.563260] Call Trace: [ 849.563260] dump_stack+0x173/0x1d0 [ 849.563260] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 849.563260] ? __should_failslab+0x266/0x290 [ 849.563260] should_fail+0xa19/0xb20 [ 849.563260] __should_failslab+0x266/0x290 [ 849.563260] should_failslab+0x29/0x70 [ 849.563260] kmem_cache_alloc_trace+0x125/0xb50 [ 849.563260] ? sctp_add_bind_addr+0x12f/0x730 [ 849.563260] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 849.563260] sctp_add_bind_addr+0x12f/0x730 [ 849.563260] sctp_copy_local_addr_list+0x4e7/0x660 [ 849.563260] ? sctp_v4_inaddr_any+0xd0/0xd0 [ 849.563260] sctp_copy_one_addr+0x1f5/0xce0 [ 849.563260] sctp_bind_addr_copy+0x22d/0x8a0 [ 849.563260] sctp_assoc_set_bind_addr_from_ep+0x219/0x270 [ 849.563260] sctp_sendmsg+0x4081/0x5ae0 [ 849.563260] ? release_sock+0x23b/0x2a0 [ 849.563260] ? sctp_getsockopt+0x185c0/0x185c0 [ 849.563260] inet_sendmsg+0x54a/0x720 [ 849.563260] ___sys_sendmsg+0xdb3/0x1220 [ 849.563260] ? inet_getname+0x490/0x490 [ 849.563260] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 849.563260] ? __fget_light+0x6e1/0x750 [ 849.563260] __se_sys_sendmsg+0x305/0x460 [ 849.563260] __x64_sys_sendmsg+0x4a/0x70 [ 849.563260] do_syscall_64+0xbc/0xf0 [ 849.563260] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 849.563260] RIP: 0033:0x458da9 [ 849.563260] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 849.563260] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 849.563260] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 849.563260] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:19 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x21) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000000, 0x31, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) r2 = getuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000280)=[0xee00, 0x0, 0xee00, 0xee01, 0x0]) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x4, r2}], {0x4, 0x2}, [{0x8, 0x2, r3}, {0x8, 0x0, r4}], {0x10, 0x69a6b5cbb2d37d34}, {0x20, 0x6}}, 0x44, 0x3) futex(&(0x7f0000000340), 0x0, 0x2, 0x0, 0x0, 0x0) [ 849.563260] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 849.563260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 849.563260] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:19 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000040)={0x3, "f1e936b3829086d4097b15794b497ba31e603a3890c1bdf48263257a020416df", 0x2, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x3e, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0) 14:54:19 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='smaps\x00') ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x0}, {}, {}, {}, {}, {}, {}, {}, {}]}) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000280)="93d4489f8f540755b793b10141a8ca6750492738bfca4d7aa0c81adfa36d6cfd6f26fd2a581cee07", 0x28}, {&(0x7f00000002c0)="c634f0a95e1d8185e01f9d62c3175dd2dfee6f4df54aabcf7ea3057feaab8d1b3cf177b9ec956de17629a29a0c9b32884bc8ed57833445eb6b643544f91dc7f963d5bb8eafda8880afdf23a591091f4e3b9e7980edb1b30a28c9a446753c61b26c05755ea8815b1622bf670c92d4ef8e29c5104a20e6f9b6fa87b61d5e6165d9de3d9d87e89ac4d3bc10b60beb9760d9eaff19201f85fce75e6ea3706755a8dde5367a104cebc5ebc662e4c6c8b3ab9ca0ec3d96bc659b8167b89a0019d2b47851", 0xc1}, {&(0x7f00000003c0)="8916e07b00c8d06b403a1cf3331d7499bcf0418a548f0859c7921ff9ff7f92d257fff42da93770964a6769462ef2b7a3301e63dd97e4c004041dfba2b7dfcb74b19695bf61fe4852317ccf68d0ce59c75804cad64ab3671e74d71c768904da65be09", 0x62}, {&(0x7f0000000640)="64ef459337019949e5d8ceaf67564aedb992e9c2cb575b81d4ca0e11944f83b356f77e977485e3ab90c6fa5c6955070059c1cded724953b4dbc657f7f8d07c22a301dbf798ac372661f14c58a02d5ef41de3187aa428297efacd4278ff5ef924b9098e6440f6a7bb2b099c2d822466a95fd51ad2b484133c2f354f8957251adeae942b45f9e13b150a2e4777c96fb536f4a587c8e1fc49e14896ca535b882e3b484c3d0b8105318cdac5ab405d13d1b22211c1ca3beeba78a36223a7342326522e34ac02e6afa20913ec474302e01d569cd6b03e225e793f1bee1f415fea319fde6bc80ed7d957e2ff2e0c7f58487ae4ee6cecbe489e45355df1dc69c7d47cdccc69a2482d0fe04020ed02f892527577806c44fc27e802daf1b03f1ff98e8f09b7070d8a8ae536ffef40c77d37917adbd045fe5b7b354b179b392418deef35269ebb85e54a4528422328bca2a2c74e1f2722eb8784b3e8299d1bdde2c682a48796b7efb3ad2c73f16b525177bdebc95e59fe03ac2c3a597d76bab977b603d445cc046623f203c0b1b5b022013d624ee383f40a67a6ac4d408a68d7c9d2df92749d00375cb76f250ff293b6b04d1283b5f166aa9f715be46f2a62ad450430d0e1692dfc592b15d9ba91c381a8a41c8294f69e9c02aac395d98324383308eda6803b629e63eabffe657db1aa84dce051ea3adf849ac3502bfa8961b7235fd34842b55aac26da3bd262a9f7adcdaa52290ce526303467260e60d2f34402ecc0fbade716b6ac666d17f49294e15e82d72674c9bc0b2a862c9d16ca63f25e12f7f2782323777b2be4051971639228e3b439e98ebc2f5d02c0cf2c1c88e7c5788af3b30e6cb622881dfcce016ccb4439106f5e1a807abb0a09ad48bc7a63e5c7419f1f55d79578310fe5e943711722ccbd042d0799f2d96d46b89b780da71bd1b984f1e55feba314ded3af32d7c178f630d3af58b57bdb84e1ed20dd350bb60e46363cbf80cbeb9619160f78c690306a6bd92fb684ffb1de3e5109efe14dd9cebefa302921e496e4e5d99f08cb9b01a2be239a25c32a805f34a147fc4704060d0b1b9a3678eb06a0f4dc06c035a2153731866a537625e71595b475c4cd9fe2f0d0a45741922917e40a2f214c1a3646e20a1798839855d90ae0ac32e3b1d64048b47605df92cbe204dd0f9c44d7e34aa68ddbe1e410e2bf19701a630b4ecc5afd6091065230045c6ce201ef191e817a17ed01731f5369dd0b8bf8ee7e418bc4d3c9192765270a04a041089c8884f89b76411c6f65543211ad7d2781236889f51202e4a2e88c7f3c1f9688dcc434b049e21fd8ab14d0e67056fc0770cb0fba87fa9bb8696748692907f8d359722eadc9a2d7a48f3bc32cf725ef968dca313e46333fb1a6341da8f2b59ef007b912e28a3b1ca27e2534898a4331266408df946de13433c19b5c1fe2f0854493dab3f7511890c00d01e0175c61846406686e7ba6460713ef9850cf50fdef504639467544ff72659bf6de95d3da79e4b345844d3f33888a53fa22fb3f99094629e38e35b2209a9eb1e5632c8e3330d899fefcfb431eefcf903b9137bdfaebd3c45bb91b76ac266c762d83656c827a42d3e25d206e3b139ae98ad6ffd04a23808a83609f0e9cfa3de3e3705290313d58d3007ae20b9269b94093dccf5df6b39799e4b6916daa4ceb725e18ea81fdeec3a465abfa28d3d6d3e718cbf36e8d53ca09dc9654f4976af9d2eae1037332b5408fd4d513740a41f7fa66d03b5e070bd9dafee1540b03386cb84026f715386e3a6814612db343bf0e87dd11d79d6816e1583bc9588b9eb4e48b771638a4c3dea521c9e66a05984ecd808dccccad767794dccdf89ee5112036ca749802ad8f4ef83f28861f4302faa38ebdda7579b9b418ed7ee186effd5723b01624a35b743a504270e89443be3c35d529d069cd830f3698cea0123274a45a230760794c53af619791fb9c0c46517eae08569a4976b29c8fed19a4037952ab1e81dfb009b0f755633c59a0e8c212ff1c75af53566e40d99dabe4c588986e4b9e50759be8ce1017a2e7b0108ecd3b533ea262745664feddddc3e7251215d549f33a82a9fef98642494b685b27bdb1915ffaf4e5a3b53b52c813cc708ab626b15c4e99e2e8dc2e8cfd4288d6670de8da5545bf6316acc04bfe9dc5ab10d31c6b2358c3812d9a7087ac68f6505226561e4bd4e03f3f9c9738175076af0cdd3cdd0843bac4f19d0c045e0e0b3fd224c2c66be71c8ab84c7f55b2510a115a60a578c9c34665b8abe01820cc124f67243019be0c360693e0b8ce2bf56739add37e4a37b6412dcb52e7169e06494758398794f274d7b1763ba3f69ade073f9b7fabec758d9e2a75c25b65e2143b58d88c03a5a5417d1e4913f62039f2720cc08361c4e580a23d868646dad899a627e37767ff8630883296d4a1d4735b0327bdb53ab280c107cef7d0a7d2c03be4556026b0bed3c93a53f3217911c6a9ea76f721fb9475cf4c8517e10d0e5343f6d703f46f6745381ef6d89c73c871b3d4f681b3f95a386d2f4061046f65b0a998ed7fe6a70384ee4b320f8165796343bcebe8bd2029082cd85472f5dc260cec64eab94ed43744d97e19cbfc77e7033f6216430a917b0691df31c22786e86a137ebe551a6f2d55da9ae4cdce8c3954ea259ded1c09bc91d544daca7185da9711606dd1fba1fed80482efa342e7c4e397a52f59787051088a778540c534e21e21fd4b4295223aaa4f0217e429db48e4c39a2a5630afb3bccae4d893836339912186b5cafdb836edb5ea70c196bddea978acd99b88d18b06e7a9d485453539666ef7106d0e34e8bbd75c5145a96d36c0dadfe7ceb3d1ce3fb3794304eb77dd4d204ad3390a21170a2423a3f358baaab937097e70723f0eb8bad306c5e8b315af22c463c3bd0637fd9be286a560e24c2998ceaa0254309a3e06974a2c96c4aec5cc9ee3a99a4f7f23fd127c09ad48a53ad95defa0e0003085ddbb67f5fa89752a8c16c9242be5e6c1c5f5f6dd837284852fbe8e9272859285195cc87e3e5539a14a3b77c4443b54917115847761a99d2a0ec16c4a0ed9aa4192c8738cb04646d2eed778531b3fdb39251530d1c01be634283357abe70debfdf0b4bac2c541fc15f712024f87496dc0f2d077b94b528f2ff95a34894947efec2ee3b5c3a9ac5ce5f3bf0413231dc4ffdd992010283bd0176dae938f19fba9755901d114a00f4f4afb33b773d259770fbcd2c257fa0cb0cfc02c0b569ace0698ad62aa2a3a329244605eedf6d871c63e40ed6adb66bd2771b3498118fd6f87f90569d9574c33a3870dee2fd0b312046378598b6ca5a78a58af429505a42fc44f6f83295d16bb9be930b161e310474569a3d4930369c2fb28fe82987d1d851d54f10656fa4de9232e1e1d3d7539750a81d04c6c4ae3b7b97c5e362335e56d448169c6877a5388b6898ff87abb1e451d83bfac937004974a8635051a83e597456d1956d85757a885f9b2e789721b1563c698d582894ffe95e63a95001f5944da4305cd9be93e26eaa18f662c2f2a481ff46e1d86f7aa6d8ff48a22187d8375264f7663d9e5440b5af114b8f028b154a5f97771e6faf0e8f412e52689e822861541f3956546bb349dd15675f7080fd1bbbc821d2440e718dc0bf039fa76c86378aee81572af109f239569c3b7904ce62b5f5556af83c482f37d66f5bce2a28152b7ddbc5e76e383f5aaa3837c9f27bc39e97312768118c175d2f2af21d3231f00003daa997cb77f721ded614555845483b83677acb7dd9912bbfdc92091a5d3b410191a78030e927c851a42dfbd8465904193e5d034c2f9c28fe77e995bbb4fcbfb3f27a28df979c1d69cfe294568cb590b630f345ccadc2eb5b84179fbf8ae9a7d236054c0df89a0e021b25a445aadd54c588a44fc93db50f862fbb13b09d489b2bce2aa373ef0407ecb037634bc5faf4b64a73499002b3f82256c64d8359d5296ae3234ab3cecfeeb25e7761131904708126b4eb1994a63972c8afe4150ffbeeaa038e0ceec43fdcfcbf54c1e948d62564709259bebe0b69143fc52d18bf65c8561266b4f9213ccefb01e688f3b1a900f89a01359829452b6d7aed9166e2e54e64c1d3cb0b4aa05d531e0a6f944e95e40eda785ff3adef025676f7a43c50b4e882210cef8ea802020a92c99d3a4a9372c6aa4871eaa99eb2cc8b04784ec49b500c4bd42e6f05de3f3414862aaa201b86fcfd22a0b50f4a2c058347c46cb86204a12ba0a8145ed0b4cd3f5b6b371022f6bc990aa38789806ff1645e73fb19e2e3f13e00498854965dff1ddb6d0812758495e4f52afce89767583e6865bcc02cdc8a23cfe8c428625f26aaede80ed9964ea6c30bb84aad1d338812507cf550cd44cd5ad558dd783ecf3fe59ba29896ff32d08272f8a3b7c3788f2e472d094bbdcd9b921ef6aa645d2ca4a3424042531efd4f647215b388726b1163a068b16515c84a5eee7ce8d2065a92bcfb6e8e82aebd704705d24c990b6f50f2c566f5dbc9847556057969f5e745ae91fffc72af06ba3ded193927addfe8715660f3c54f76014e9c81b6aa1a0448eaf44506f40263228123b3f5aa76530d5a2621b85c9a201f619694fe18ac2128f229e8a009b4e3f57c1be71e71a58a90815f3875b87251348854193b8caf51e2141f6036ba542e0c224e315c69247d94d5e8a38721f4d22977001dd4c28905f1374ad2cee27250e31d8d798c969703cdd34e4a9d62e8816874bc0f19a0d4ab1f5eadb69617d2b592dd71aaae869277c4eefaf95c3fe1322af0fb35e6e7b7cfa038b68192f3043074080edbbf095e6c8f737af0c5aa278c89d062af25d4836734b998d4b381c5d596ef0f39f8019f1b792332a1006e7a7158b0fe43e4a67c76081ea5b4beafcc013df507afb427755efb7563cf08bbd8675ccca492126a647cdaea57ef64a57e506eab5fc219efef4561c3c895bbf9d950d7f454fecf305ad3b62b6495c606f27e3ee9d9f6989c07be87afe9de14f0ce9d7616790b65b683b785334afc62c05be517ded0d5f3d52b622e7d1897af0b45a42a57f67c90524753a1a95c035db73d8bcf26a9b0c2e40cb51b748f0f4f874487020ece259deb774bc0fd3ea971ad85df3df17f5f869331349c83bd11b1b00ac6a6c0ddcb22f32cf076d2ca67f16ea565c80ff62622df7f2f17ee911c4e531fe0ca97d7f7afd77bad832a5152ffaf4066334cec2af9c2e1c6ff471a05ca144f1aa2f1c4581770405e4b5ebee549976dad41db23f6f7ac69f4f52665d2cdfa5d899cc0140e5a28849203aec7b4016bdac5b6c13eba55aaeccf9e3e8ac090c9cb36aabd99ccaafbf649d82ebf37244e9886d11efa374b684bca24a8e0cb8b91d076e394ff43608e834d5d299fe640b40778db533fb22313966c28db943ec1b2365d33a46097701de9644d22c22f8bb16e68255e0bec1716b554bdd7db146fe7e74ced65bb97d97f1535a7455d2f19046b49f31df5dca7436607cd1025b461f3feba67921aaaec35f52348abe3e3cc05de06e8f4f22a345770b1c66f864189f630dedcd81ddae8bbd5705662c1500ec0b3f30e4811648e36db3970c174fec5d820a8eaef5bf5dbce7e01159d0db02dacc9e1e8149c72dea9e8053d36581b252ac988ae4d110aeebf7c1a3dbba7f8c5d23ac191ababc307a89514157e9f8d6e38e854a62970649ed912118937034e42669f5225a9f791de3a076f7d1adfbfa59ebfe137df62eeedc7de43e8da6daf7b57930e7bf", 0x1000}, {&(0x7f0000000440)="ad5ed8ec2c0e8a892292b64357ff5522c9790715680baf8e43012a50883768a876f534b2815b88e195502466c8a5cdb2c71fa6b70126d9", 0x37}, {&(0x7f0000001640)="61636c75c4433d12dacd59113722fd7a1d1507c295b933afaeb3b181c9874bde9169948680e8", 0x26}], 0x6, 0x0, 0x0, 0x40}, 0x10) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000001c0)={r2, 0x1}) openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xa909, 0x0, 0x8, 0xffffffff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100)={r5, 0xd9, "0878acbd26f73f1257d94a3eeafece4ff49111362b9171fcfcbd0463d5301f0d657fe175c699b82fb475e6ae4e331498413c6a32b73b32401213dd4db7d5cfecfd8c25abbd478e4bfa6579c1997f86fc5f4d542c691efdc4f7cab6b50bd695d60c5da4980da7e22a1317c16f68101363ec6a872802ecfd2f06f2819ef91c5c07f930fe4afb6fe3de90098d6a66a093c05d259777cf80911e8c3aab196b769377f98921f11752f7948ef63f225a8d2108e680e93056bc73b15595757c76693df81d3fbfc5518a196abfcd249a746817f84ad99840b9a1a2241b"}, &(0x7f0000000240)=0xe1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) shutdown(r3, 0x0) tkill(r0, 0x1004000000016) 14:54:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') socket$bt_rfcomm(0x1f, 0x0, 0x3) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 850.453811] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 850.471860] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 850.471860] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 850.471860] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 850.471860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 850.471860] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:20 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') accept(0xffffffffffffff9c, &(0x7f0000000900)=@hci={0x1f, 0x0}, &(0x7f0000000440)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000980)={0x0, @loopback, @dev}, &(0x7f00000009c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @remote, @loopback}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000c40)=0xe8) r6 = accept4(0xffffffffffffff9c, &(0x7f0000000f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001000)=0x80, 0x80800) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001440)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000020c0)={@mcast2, 0x0}, &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003340)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003380)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000003480)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003740)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000003840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000003e40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80400020}, 0xc, &(0x7f0000003e00)={&(0x7f0000003880)={0x574, r1, 0x120, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x25c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x40, 0xffffffffffffd347, 0x1}, {0x0, 0x1, 0x7, 0x7}, {0xfffffffffffffea7, 0x1, 0x1, 0x3f}, {0x8, 0x8, 0x80000000, 0x20000}, {0x71d, 0x10001, 0x2, 0x4}, {0x40, 0x5, 0x6, 0x9}, {0xf9, 0x0, 0x100, 0xfffffffffffffffd}, {0xf256, 0xa8e, 0x9, 0x8}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0xfffffffffffffd65, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x40, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r12}, {0x220, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xe29}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x180}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xc1}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r14}}}]}}]}, 0x574}, 0x1, 0x0, 0x0, 0x10}, 0x40000) r15 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r15, &(0x7f0000000c80)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:54:21 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) [ 851.218097] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.218097] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 851.218097] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 851.218097] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 851.218097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 851.218097] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:21 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\xc8s(>>8\xfb\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq') madvise(&(0x7f000011e000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x15) openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000000c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x00\x00\x00\x00;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x00\x00\x00\x00\x00\x00') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x7f}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 851.880169] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.880169] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 851.880169] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 851.880169] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 851.880169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 851.880169] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:22 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0000000042f5b60f9b3018608000000000000000cd611944407d66ad7587f02d4541effd159d9ed22a29"]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x64, @loopback, 0x4}, {0xa, 0x4e20, 0xb7c, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}, r2, 0xffffffffffffffff}}, 0x48) getsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 14:54:22 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:22 executing program 2: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x86, 0x400100) socket$can_bcm(0x1d, 0x2, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0xf) r1 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000280)=0x7) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$TIOCSIG(r1, 0x40045436, 0xe) 14:54:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:22 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000000c0)='fd/4\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='children\x00') ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) connect$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x8, 0x6, @broadcast}, 0x14) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="240000001e0007041dfffd946f610500074000001f00000000000400080009000400ff7e280000001100fffdba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 852.976266] FAULT_INJECTION: forcing a failure. [ 852.976266] name failslab, interval 1, probability 0, space 0, times 0 [ 852.989309] CPU: 1 PID: 26673 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 852.996776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.000303] Call Trace: [ 853.000303] dump_stack+0x173/0x1d0 [ 853.000303] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 853.000303] should_fail+0xa19/0xb20 [ 853.000303] __should_failslab+0x266/0x290 [ 853.000303] should_failslab+0x29/0x70 [ 853.000303] kmem_cache_alloc+0xff/0xb70 [ 853.000303] ? dst_alloc+0x2db/0x900 [ 853.000303] ? __msan_poison_alloca+0x1e0/0x290 [ 853.000303] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 853.000303] dst_alloc+0x2db/0x900 [ 853.000303] ip_route_output_key_hash_rcu+0x22e8/0x3ba0 [ 853.000303] ip_route_output_flow+0x1ee/0x3e0 [ 853.000303] sctp_v4_get_dst+0x753/0x1690 [ 853.000303] ? sctp_v4_xmit+0x2f0/0x2f0 [ 853.000303] sctp_transport_route+0x515/0xc10 [ 853.000303] sctp_assoc_add_peer+0xb2f/0x2030 [ 853.000303] sctp_sendmsg+0x4924/0x5ae0 [ 853.000303] ? release_sock+0x23b/0x2a0 [ 853.000303] ? sctp_getsockopt+0x185c0/0x185c0 [ 853.000303] inet_sendmsg+0x54a/0x720 [ 853.000303] ___sys_sendmsg+0xdb3/0x1220 [ 853.000303] ? inet_getname+0x490/0x490 [ 853.000303] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 853.000303] ? __fget_light+0x6e1/0x750 [ 853.000303] __se_sys_sendmsg+0x305/0x460 [ 853.000303] __x64_sys_sendmsg+0x4a/0x70 [ 853.000303] do_syscall_64+0xbc/0xf0 [ 853.000303] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 853.000303] RIP: 0033:0x458da9 [ 853.000303] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 853.000303] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 853.000303] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 853.000303] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 853.000303] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 853.000303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 853.000303] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 853.949645] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 854.002140] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 854.009336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 854.002140] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 854.002140] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 854.002140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 854.002140] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:24 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 14:54:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, 0x0, 0x3f00) 14:54:24 executing program 3: r0 = memfd_create(&(0x7f0000000200)='vboxnet0nodev\x00', 0x7) unshare(0x20400) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000040)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x6) fcntl$addseals(r0, 0x409, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40, 0x0) 14:54:24 executing program 0: syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], 0x0) 14:54:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000000c0)=0x14) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@rand_addr=0x91ea, @in=@empty, 0x4e22, 0x8, 0x4e24, 0x7fff, 0xa, 0x20, 0x20, 0x0, r4, r5}, {0x2, 0x20, 0x552c, 0x80, 0x80, 0x0, 0x8, 0x9}, {0x1, 0x8, 0x6, 0xaf}, 0x2, 0x6e6bba, 0x2, 0x1, 0x2, 0x2}, {{@in6=@loopback, 0x4d4, 0x3b}, 0xa, @in=@multicast1, 0x3506, 0x5, 0x3, 0x3, 0x8, 0xfff, 0x325}}, 0xe8) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x24, 0x10000000004, @tid=r0}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2001, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000080)={0x5, 0x1, 0x1, 0x7}, 0x10) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) 14:54:25 executing program 1 (fault-call:7 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000180)={r4}) 14:54:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 855.152860] FAULT_INJECTION: forcing a failure. [ 855.152860] name failslab, interval 1, probability 0, space 0, times 0 [ 855.164845] CPU: 0 PID: 26746 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 855.173081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.179680] Call Trace: [ 855.179680] dump_stack+0x173/0x1d0 [ 855.179680] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 855.179680] ? __should_failslab+0x266/0x290 [ 855.179680] should_fail+0xa19/0xb20 [ 855.179680] __should_failslab+0x266/0x290 [ 855.206317] should_failslab+0x29/0x70 [ 855.206317] __kmalloc+0xaf/0x3a0 [ 855.206317] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 855.206317] ? sctp_bind_addrs_to_raw+0x20d/0x5c0 [ 855.206317] sctp_bind_addrs_to_raw+0x20d/0x5c0 [ 855.206317] ? sctp_sf_do_prm_asoc+0x159/0x6b0 [ 855.206317] sctp_make_init+0x220/0x3e40 [ 855.206317] ? __local_bh_enable_ip+0x49/0x1f0 [ 855.206317] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 855.206317] sctp_sf_do_prm_asoc+0x159/0x6b0 [ 855.206317] sctp_do_sm+0x2c8/0x9af0 [ 855.206317] ? sctp_sf_violation+0x290/0x290 [ 855.206317] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 855.206317] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 855.206317] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 855.206317] ? __genradix_ptr+0x7f3/0xbb0 [ 855.206317] ? sctp_sched_fcfs_init+0x30/0x30 [ 855.206317] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 855.206317] ? __msan_get_context_state+0x9/0x20 [ 855.206317] sctp_primitive_ASSOCIATE+0x172/0x1a0 [ 855.206317] sctp_sendmsg_to_asoc+0xb97/0x2160 [ 855.206317] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 855.206317] sctp_sendmsg+0x3467/0x5ae0 [ 855.206317] ? release_sock+0x23b/0x2a0 [ 855.206317] ? sctp_getsockopt+0x185c0/0x185c0 [ 855.206317] inet_sendmsg+0x54a/0x720 [ 855.206317] ___sys_sendmsg+0xdb3/0x1220 [ 855.206317] ? inet_getname+0x490/0x490 [ 855.206317] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 855.206317] ? __fget_light+0x6e1/0x750 [ 855.206317] __se_sys_sendmsg+0x305/0x460 [ 855.206317] __x64_sys_sendmsg+0x4a/0x70 [ 855.206317] do_syscall_64+0xbc/0xf0 [ 855.206317] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 855.206317] RIP: 0033:0x458da9 [ 855.206317] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 855.206317] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 855.206317] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 855.206317] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 855.206317] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 855.206317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 855.206317] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) 14:54:25 executing program 0: syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], 0x0) 14:54:25 executing program 3: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x8, 0x4) ioctl(r0, 0xffffffffbfffbfa2, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000000)=0x2) 14:54:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 14:54:25 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/ip6_tables_matches\x00') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 856.335201] RSP: 002b:00007f150ac33c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.335201] RAX: ffffffffffffffda RBX: 00007f150ac33c90 RCX: 0000000000458da9 [ 856.335201] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 856.335201] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 856.335201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac346d4 [ 856.335201] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 [ 856.599805] CPU: 0 PID: 26786 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #2 [ 856.602276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.602276] Call Trace: [ 856.602276] dump_stack+0x173/0x1d0 [ 856.602276] should_fail+0xa19/0xb20 [ 856.602276] __should_failslab+0x266/0x290 [ 856.602276] should_failslab+0x29/0x70 [ 856.602276] kmem_cache_alloc_node+0x123/0xc30 [ 856.602276] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 856.602276] ? __alloc_skb+0x218/0xa20 [ 856.602276] ? local_bh_enable+0x36/0x40 [ 856.602276] __alloc_skb+0x218/0xa20 [ 856.602276] ? kmsan_get_shadow_origin_ptr+0x51/0x480 [ 856.602276] __ip6_append_data+0x446a/0x5dc0 [ 856.602276] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 856.602276] ip6_append_data+0x3c2/0x650 [ 856.602276] ? do_rawv6_getsockopt+0x4a0/0x4a0 [ 856.602276] ? do_rawv6_getsockopt+0x4a0/0x4a0 [ 856.602276] rawv6_sendmsg+0x261d/0x58a0 [ 856.602276] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 856.602276] ? aa_label_sk_perm+0x6d6/0x940 [ 856.602276] ? update_cfs_rq_load_avg+0x596/0x9c0 [ 856.602276] ? aa_sk_perm+0x741/0xb00 [ 856.602276] ? compat_rawv6_ioctl+0x100/0x100 [ 856.602276] inet_sendmsg+0x54a/0x720 [ 856.602276] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 856.721912] ___sys_sendmsg+0xdb3/0x1220 [ 856.721912] ? inet_getname+0x490/0x490 [ 856.721912] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 856.721912] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 856.721912] ? __fget_light+0x6e1/0x750 [ 856.721912] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 856.751800] __se_sys_sendmsg+0x305/0x460 [ 856.751800] __x64_sys_sendmsg+0x4a/0x70 [ 856.751800] do_syscall_64+0xbc/0xf0 [ 856.751800] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 856.751800] RIP: 0033:0x458da9 [ 856.751800] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 856.751800] RSP: 002b:00007f8a992a8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.751800] RAX: ffffffffffffffda RBX: 00007f8a992a8c90 RCX: 0000000000458da9 14:54:26 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) [ 856.751800] RDX: 0000000000003f00 RSI: 0000000020000380 RDI: 0000000000000003 [ 856.751800] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 856.751800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a992a96d4 [ 856.751800] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000004 14:54:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x2, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x40, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 14:54:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 857.579149] RSP: 002b:00007f150ac33c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 857.579149] RAX: ffffffffffffffda RBX: 00007f150ac33c90 RCX: 0000000000458da9 [ 857.579149] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 857.579149] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 857.579149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac346d4 [ 857.579149] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000005 14:54:27 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffc1d6120c94aaaaaaaaaabb86dd60b4090000303a000600001553936ef195cff32d0000000000a886ffffe0000002ff020000000000000000000000000001830090780000040060b680ba0000000000000000000000000000ffffffffffff00000000000000000000ffffac14ffbb79140373fa12b60bf5a7bd0ab538a89da6118dd633c233c1"], 0x0) 14:54:28 executing program 3: syz_emit_ethernet(0x93, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [{[], {0x8100, 0x328, 0x8000}}], {@ipx={0x8137, {0xffff, 0x81, 0x7, 0x0, {@broadcast, @random="d69acdc39aba", 0x20}, {@broadcast, @random="ae980765e966", 0x7}, "7bdd1b242ba350f0a818dea895812de8652494680eef6070b04001d23d6f8cb250062ca6d69212f3d5d22a1b6a9543a274913e50c84efab63941220695ed6a49c9193264aee08b459ba52c5e70dc34e1820b54d72f04fc1c68b83e6eaddca668c0f32b"}}}}, &(0x7f0000000140)={0x0, 0x2, [0x37b, 0x501, 0x96f, 0xef9]}) kexec_load(0x9, 0x7, &(0x7f00000014c0)=[{&(0x7f0000000180), 0x0, 0x7, 0x80}, {&(0x7f00000001c0)="69e09dcf0d80eb3cf9316f57954f28f11a8458140da82968c63c9fff5ff33edfb0e28a983b052c44d86ba9aa6507cfd733cfc4cbaffa9f8a8e491e29bec7af2821a05acd79f1a283862dbba0c0f6f4b61d7c1e704cd2be89710a11", 0x5b, 0xcf7c, 0x1ff}, {&(0x7f0000000240)="572a135bf51f9361bdcc265d490fddf2b284ecf5c818e0b5a27762365e27a4f2aebc7bad93128fac4fe07feab508592c9c82af4ae5a1bc616f3eff0ff43bd4f4ff54950f190a8a64ab7f2097efed6bbded58b2cdb1937beb68c6aac9e86e7cc73e4a35778b72ba79f70ae3e08ca6e7b008c5674f330799ab506bbd1bbabb05a9dc7da399352d5e3bb10629cc1f1ebf8a01a7926675ec616b3572038e2dc4354ef004dc2e1d7e43b99e0d187c9995861f5f9f8596f0df37d5d7fea9757e", 0xbd, 0x8001, 0x80000000}, {&(0x7f0000000300)="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", 0x1000, 0x8, 0xfffffffffffffffb}, {&(0x7f0000001300)="69a9d0506e22e58c62035a06931736c5af04281681d1efc236dbe10e2239969ac844c8d7fb31c5d16f1d7f88f158c722dfc3fa5af78228c4c66f60b18e63b25a9a79de5c146745644326374305fcb7e47213ab02155bbd27181956aa9fc2bdb826e07b5e6b4674a19cd6be50333782aa47717aacbb9e2635a09b47b765d6e7335d5e24e6c043ba095dbe223582ea6c61024334cad951d3339626ce2539ea2a611698387340568b60dfb36e00506a23d181a0b6", 0xb3, 0x1f}, {&(0x7f00000013c0)="820d09fd59d2c4361a51aa2850b798881f93fcf5fe2c59b86f257e6446c6ba103b41096862", 0x25, 0x0, 0x401}, {&(0x7f0000001400)="ad4b45112af35c704e7c734610c063fcfc05c13d66cae253d22aee97f75b00c4334149045355b313f9f4b7f764c142d08bb5d12eca850056883037872a863d15ad89fd679a27449128a149e6e2ac3392d53eb06e0f4f6389481bbc47c2123dc4f28aa5be4303182a28c7fdbe232e9f5ea911464b66f9f23de3bc4985a43ba52c439627b4258ae57cd0014408bdc0eaa9b444bd7ce86e57185c", 0x99, 0x17, 0xc7e}], 0xa0000) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 14:54:28 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffc1d6120c94aaaaaaaaaabb86dd60b4090000303a000600001553936ef195cff32d0000000000a886ffffe0000002ff020000000000000000000000000001830090780000040060b680ba0000000000000000000000000000ffffffffffff00000000000000000000ffffac14ffbb79140373fa12b60bf5a7bd0ab538a89da6118dd633c233c1"], 0x0) 14:54:28 executing program 1 (fault-call:7 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 858.501930] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 858.501930] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 858.501930] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 14:54:28 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10100, 0x0) write$rfkill(r0, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x3d6) 14:54:28 executing program 2: getpid() r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x121001, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="00000600b7b33cb67a2bae796ac415bcce6acb7db8abdda483872846b0e1521eebd450c69e84bafcb510e1fa4c2bc60b3af94b122cc9aae35d586caea429811223729cc94a23846bcc861735184e6a42fe497e8b5eabc3cb6bb11b4e64e041452a09524d09b2865fce8ceeb967567c12d415a93789956b1e4c950f8d3b688f42ee89451414bda6eebfd3de7604ce0e8eca2579327d0557c2", @ANYRES16=r1, @ANYBLOB="220020bd7000ffdbdf2503000000080001004e230000080002000a000000080001004e0200000800040001000000080002000a00000004002f05000800040003000000080002000a0040a02c79260b53203d10a34d99d38e1bd137c0ab8cd2373e8659707dada88d9f379b928ac4a60cb8f2fafa4c"], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x40000c4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)='wlan0%keyringuser,\x00'}, 0x30) gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x7fffffff}, 0x1) r4 = syz_open_procfs(r3, &(0x7f0000000180)='pagemae\x00') r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0}) clock_nanosleep(0x3, 0x1, &(0x7f0000000500)={r3, r4+30000000}, &(0x7f0000000540)) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000440)="729af3abb5585f19bd32cfecb7e38a0bd37780e56753cd33df440efde56f73f23ec853b6446f02a2c7c660e8294227efde827b6c419884abbfce8773f30ef0abdd0fecca3195d9b5693d95c10fb8e89db2e5919bbb29ed6a84b5961ea2836fd126d69bc350e5190fb1e6c3a0f3682c86c5fb1a1bd14bead036d9662c5a7722503d5dc93c3d23b38047623af7c08478dca5626aa47dd8d39f35862b095909490f7ac5fcde100e0a", 0xa7) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 14:54:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xf0\xe2\xee\x92d%.\xd3N\x1an\xf8\t\x0f&X\xd7\xe0J%U\xce\xfbhp\x7f\xe0\xc1\x15\x1c\x18\xc8\xdd\xb7\x1f\x8c\xee+\xf1\xb2y\x15\xd3F\xdb\x8a\r\xb5?X\x96\f\x12H)\x9b\xfa=\x9c-s\x03\"\xcd\xb3/Q\xcc\x06\xb8\xa0;\x8d@0u\xddW\xf1,\x14\xec@p29 \xd6W\xbcO90x0, r0, 0x0, 0x16, &(0x7f0000000000)='proceth1!\xb5&vboxnet0^-\x00', 0xffffffffffffffff}, 0x30) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x0, r2}) lseek(r1, 0x20400000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) [ 859.167153] __should_failslab+0x266/0x290 [ 859.167153] should_failslab+0x29/0x70 [ 859.167153] kmem_cache_alloc_node+0x123/0xc30 [ 859.167153] ? __alloc_skb+0x218/0xa20 [ 859.167153] ? save_stack_trace+0xa2/0xe0 [ 859.167153] __alloc_skb+0x218/0xa20 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x51/0x480 [ 859.167153] sctp_packet_transmit+0x469/0x44d0 [ 859.167153] ? sctp_packet_append_chunk+0x110f/0x12b0 [ 859.167153] sctp_outq_flush+0x9b8/0x5d10 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 859.167153] sctp_outq_uncork+0xd0/0xf0 [ 859.167153] sctp_do_sm+0x952b/0x9af0 [ 859.167153] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 859.167153] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 859.167153] ? __genradix_ptr+0x7f3/0xbb0 [ 859.167153] ? sctp_sched_fcfs_init+0x30/0x30 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 859.167153] sctp_primitive_ASSOCIATE+0x172/0x1a0 [ 859.167153] sctp_sendmsg_to_asoc+0xb97/0x2160 [ 859.167153] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 859.167153] sctp_sendmsg+0x3467/0x5ae0 [ 859.167153] ? release_sock+0x23b/0x2a0 [ 859.167153] ? sctp_getsockopt+0x185c0/0x185c0 [ 859.167153] inet_sendmsg+0x54a/0x720 [ 859.167153] ___sys_sendmsg+0xdb3/0x1220 [ 859.167153] ? inet_getname+0x490/0x490 [ 859.167153] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 859.167153] ? __fget_light+0x6e1/0x750 [ 859.167153] __se_sys_sendmsg+0x305/0x460 [ 859.167153] __x64_sys_sendmsg+0x4a/0x70 [ 859.167153] do_syscall_64+0xbc/0xf0 [ 859.167153] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 859.167153] RIP: 0033:0x458da9 [ 859.167153] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:54:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 860.165782] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 860.165782] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 860.165782] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 860.165782] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 860.165782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 14:54:30 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffc1d6120c94aaaaaaaaaabb86dd60b4090000303a000600001553936ef195cff32d0000000000a886ffffe0000002ff020000000000000000000000000001830090780000040060b680ba0000000000000000000000000000ffffffffffff00000000000000000000ffffac14ffbb79140373fa12b60bf5a7bd0ab538a89da6118dd633c233c11a797a48078792753d25c93fbc30e533366a1897a6666cd08b6349a71133ca663042101de0371227228cf42e6f34a1ccea0d6fd9070b77d7a748f657740cb0d220ec8abfb9603f801273375557f88b454627f94c87fce7c65139f766d657f1481ae382b643"], 0x0) [ 860.165782] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:30 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f000046e000/0x1000)=nil, &(0x7f0000454000/0x4000)=nil, &(0x7f0000272000/0x1000)=nil, &(0x7f000052a000/0x2000)=nil, &(0x7f0000260000/0x1000)=nil, &(0x7f00005cf000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000643000/0x4000)=nil, &(0x7f0000479000/0x4000)=nil, &(0x7f00000dd000/0x1000)=nil, &(0x7f00001f3000/0x4000)=nil, &(0x7f00000000c0)="bbf7e6ea32573ddd890232c676ef0acb0ec28f1b18cb44f6aa2c21d31f8a3959076bf05011111d2d8f695803c79fdd72f0ceebc58c0a8a64fe1479d2a0525352cde0b693fc347a34a2b8671fb4abe52b6344cad548ffa67b47761f01aaf380d9f25adf3e72085e1a86e5675f31b5316fd3177e8958f47359fa2ee1e2e4d5fc1fbfffaff2890efaf51db03f65cd847dfdbaf3170236", 0x95, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000640)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) r5 = getegid() fstat(r1, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000d80)=@broute={'broute\x00', 0x20, 0x4, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x0, &(0x7f00000001c0), &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x1, 0x8137, 'hsr0\x00', 'bond_slave_0\x00', 'bond0\x00', 'eql\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x100, 0x168, 0x198, [@owner={'owner\x00', 0x18, {{r3, r4, r5, r6, 0x1, 0x1}}}, @helper={'helper\x00', 0x28, {{0x1, 'Q.931\x00'}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xffffffffffffffff}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xf1}}}]}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x5, 0x4c, 0x88e5, 'erspan0\x00', 'veth1_to_bond\x00', 'ip_vti0\x00', 'veth1\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x20}, [0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0x5, 0x1, 0x88fb, 'team_slave_0\x00', 'bpq0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', @random="3784144f5842", [], @broadcast, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x198, 0x198, 0x1c8, [@comment={'comment\x00', 0x100}]}}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffc}}}, {{{0x0, 0x12, 0x800, 'lo\x00', 'veth1_to_team\x00', 'rose0\x00', 'veth0_to_bond\x00', @remote, [0x0, 0x0, 0x0, 0xff, 0xff], @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff], 0xf0, 0xf0, 0x120, [@statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x4, 0xffffffffffff8001, 0x4}}}, @quota={'quota\x00', 0x18, {{0x1, 0x0, 0x7, 0x3f}}}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x1}}}}]}]}, 0x628) lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x4000000000000000}, 0xf) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7ff, 0x101000) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:31 executing program 1 (fault-call:7 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) [ 861.224853] FAULT_INJECTION: forcing a failure. [ 861.224853] name failslab, interval 1, probability 0, space 0, times 0 [ 861.237087] CPU: 1 PID: 26947 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #2 [ 861.244620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.246790] Call Trace: [ 861.246790] dump_stack+0x173/0x1d0 [ 861.246790] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.246790] ? __should_failslab+0x266/0x290 [ 861.246790] should_fail+0xa19/0xb20 14:54:31 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffc1d6120c94aaaaaaaaaabb86dd60b4090000303a000600001553936ef195cff32d0000000000a886ffffe0000002ff020000000000000000000000000001830090780000040060b680ba0000000000000000000000000000ffffffffffff00000000000000000000ffffac14ffbb79140373fa12b60bf5a7bd0ab538a89da6118dd633c233c11a797a48078792753d25c93fbc30e533366a1897a6666cd08b6349a71133ca663042101de0371227228cf42e6f34a1ccea0d6fd9070b77d7a748f657740cb0d220ec8abfb9603f801273375557f88b454627f94c87fce7c65139f766d657f1481ae382b643"], 0x0) [ 861.246790] __should_failslab+0x266/0x290 [ 861.277072] should_failslab+0x29/0x70 [ 861.277072] kmem_cache_alloc+0xff/0xb70 [ 861.277072] ? __nf_conntrack_alloc+0x16f/0x6c0 [ 861.277072] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] __nf_conntrack_alloc+0x16f/0x6c0 [ 861.277072] init_conntrack+0x6cb/0x2490 [ 861.277072] nf_conntrack_in+0x1498/0x27d0 [ 861.277072] ipv4_conntrack_local+0x1e2/0x370 [ 861.277072] ? ipv4_conntrack_in+0x80/0x80 [ 861.277072] nf_hook_slow+0x176/0x3d0 [ 861.277072] __ip_local_out+0x6dc/0x800 [ 861.277072] ? __ip_local_out+0x800/0x800 [ 861.277072] __ip_queue_xmit+0x1b4a/0x2140 [ 861.277072] ? __kfree_skb+0x1df/0x210 [ 861.277072] sctp_v4_xmit+0x252/0x2f0 [ 861.277072] ? sctp_addr_wq_timeout_handler+0x7b0/0x7b0 [ 861.277072] sctp_packet_transmit+0x3f9f/0x44d0 [ 861.277072] sctp_outq_flush+0x9b8/0x5d10 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] sctp_outq_uncork+0xd0/0xf0 [ 861.277072] sctp_do_sm+0x952b/0x9af0 [ 861.277072] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 861.277072] ? __genradix_ptr+0x7f3/0xbb0 [ 861.277072] ? sctp_sched_fcfs_init+0x30/0x30 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] sctp_primitive_ASSOCIATE+0x172/0x1a0 [ 861.277072] sctp_sendmsg_to_asoc+0xb97/0x2160 [ 861.277072] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 861.277072] sctp_sendmsg+0x3467/0x5ae0 [ 861.277072] ? release_sock+0x23b/0x2a0 [ 861.277072] ? sctp_getsockopt+0x185c0/0x185c0 [ 861.277072] inet_sendmsg+0x54a/0x720 [ 861.277072] ___sys_sendmsg+0xdb3/0x1220 [ 861.277072] ? inet_getname+0x490/0x490 [ 861.277072] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 861.277072] ? __fget_light+0x6e1/0x750 [ 861.277072] __se_sys_sendmsg+0x305/0x460 [ 861.277072] __x64_sys_sendmsg+0x4a/0x70 [ 861.277072] do_syscall_64+0xbc/0xf0 [ 861.277072] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 861.277072] RIP: 0033:0x458da9 [ 861.277072] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 861.277072] RSP: 002b:00007f150ac75c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 861.277072] RAX: ffffffffffffffda RBX: 00007f150ac75c90 RCX: 0000000000458da9 [ 861.277072] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 861.277072] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 861.277072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f150ac766d4 [ 861.277072] R13: 00000000004c5ff5 R14: 00000000004da7d8 R15: 0000000000000006 14:54:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00']) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") [ 861.576404] QAT: Invalid ioctl [ 861.617978] QAT: Invalid ioctl 14:54:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) ptrace(0x4207, r3) sendto$inet6(r0, &(0x7f0000000100)="9413d2298dbf13473fa7c718977a3238198fdbcb01595aabd75fdd68ef08c904806e2ff9f9f08709da12793a864c", 0x2e, 0x4040, 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000140)=0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r4, 0x20400000, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00005b6000/0x4000)=nil, 0x4000, 0x100f) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 14:54:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x20004000) 14:54:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x5, "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", 0xea, 0x9, 0xff, 0x7, 0x3, 0x20, 0x0, 0x1}, r2}}, 0x128) lseek(r1, 0x20400000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:32 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffffe38, 0x0, 0x9d}, 0x3f00) 14:54:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/udplite\x00') write$P9_RSYMLINK(r1, &(0x7f00000001c0)={0x14, 0x11, 0x1, {0x10, 0x2}}, 0x14) mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x802) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000080)=""/84, &(0x7f0000000140)=0x54) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r1, &(0x7f0000000040)=0x1000000000000100, r2, 0x0, 0x1000000207ff, 0xfffffbfffffffffd) 14:54:33 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RATTACH(r1, &(0x7f0000000180)={0xd, 0x69, 0x1001, {0xd5, 0x2}}, 0x9) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) 14:54:34 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000040)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write$P9_RGETATTR(r1, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x40, {0x0, 0x3}, 0x10, r2, r3, 0x9f, 0x14c1ffed, 0x80000001, 0xffffffff, 0x0, 0x9, 0x3, 0xb57, 0xbdda, 0x9e4, 0x6, 0x401, 0x8, 0x5, 0x8}}, 0xa0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:34 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f0000000180)=0xe8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x40000, 0x0) r4 = request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000002c0)='OPL\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, r2, r4) bind$xdp(r0, &(0x7f0000000200)={0x2c, 0x7, r1, 0x3a, r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x2f}, [@ldst={0x5}], {0x95, 0x0, 0x0, 0x74}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 14:54:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:35 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) socket$key(0xf, 0x3, 0x2) 14:54:35 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in6={{0xa, 0x4e20, 0xadd2, @remote, 0x7}}, 0x3, 0xffff, 0xffff, 0x3ff, 0x30}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r2, 0x8}, 0x8) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x12000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000140)={0x80}, 0x1) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xd594, 0x492, 0xffffffff7fffffff}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000000c0)={r3, 0xff}, &(0x7f0000000100)=0x8) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000001c0)={0x30, 0x5, 0x0, {0x0, 0x3, 0x4, 0x5d5}}, 0x30) 14:54:37 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 14:54:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xfffffffffffffffd, 0x0, @mcast2, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff4d, 0x0, 0x0, 0x0, 0xffffffffffffffba}, 0x3f00) 14:54:37 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xb, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) socket$unix(0x1, 0x5, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xe4, 0x200000) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") 14:54:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xeb51, 0x3ff, 0x8, 0x558}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e20, 0x3ba6, @remote, 0x9}}, 0x576}, &(0x7f0000000240)=0x90) lseek(r3, 0x20400000, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) write$FUSE_LSEEK(r3, &(0x7f0000000440)={0x18, 0xfffffffffffffff5, 0x7, {0xb5}}, 0x18) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000640)={0x1, {{0x2, 0x4e21, @rand_addr=0xfffffffffffffff7}}}, 0x88) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r8 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) r9 = msgget(0x3, 0x100) msgrcv(r9, &(0x7f0000000600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000ab1a66e25400"/63], 0x3a, 0x0, 0x0) ioctl$KVM_SET_XCRS(r8, 0x4188aea7, &(0x7f0000000180)=ANY=[@ANYBLOB="ae128a443ab260e6bdbaff5b924f0c9a3dff3b0a972f42141c05f6940adab5b4eb04f6f18bcfd17259d283e313579be5e5dd0690e73083bd1035d5c83db4e936cf29375ef86acd646421f9d66b9b3bc3409c3a00"/95]) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000140)=0x5, 0x4) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000), &(0x7f00000000c0)=0x4) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) sched_setaffinity(r1, 0x8, &(0x7f00000001c0)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0xff, @mcast2, 0x5}}, 0x4, 0x6, 0x9, 0xa997, 0x94}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r3, 0xcd62, 0x70c1, 0x8}, 0x10) 14:54:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @empty, 0x5}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:39 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xb, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) socket$unix(0x1, 0x5, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xe4, 0x200000) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") 14:54:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x4, 0x210001) ioctl$VIDIOC_QUERYSTD(0xffffffffffffff9c, 0x8008563f, &(0x7f0000000200)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000240)=r2) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x0, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xffff, @media='eth\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 14:54:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @empty, 0x5}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) accept$inet6(r0, 0x0, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x125002) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x7) 14:54:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000100)={{0xff, 0x9, 0x6, 0xfc, 0x8, 0x53b}}) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @empty, 0x5}, 0x1c) 14:54:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in6={{0xa, 0x4e23, 0x6, @remote, 0x2}}, [0x401, 0x4, 0x3a38, 0x7fffffff, 0x3, 0x10000, 0x8001, 0x526, 0x5, 0x8, 0xfffffffffffffffd, 0x74c4, 0xfff, 0x1ff, 0x4]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r3, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000180)={r4, 0x9}, &(0x7f00000001c0)=0x8) 14:54:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0, 0x6}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r4) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f00000000c0)={0xdba, r3}) 14:54:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, r1, 0x0, 0x5, &(0x7f00000000c0)='fd/4\x00', 0xffffffffffffffff}, 0x30) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000040)=0xeb73) r3 = syz_open_procfs(r2, &(0x7f0000000000)='qet/rfcodm\x10') lseek(r3, 0x20400000, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x60da, 0x6, 0x1000, 0x8001, 0x7}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000140)={r3, @in={{0x2, 0x4e20, @broadcast}}, [0x100000000, 0x6, 0x1f, 0x6, 0x5, 0xe77, 0x8, 0x6, 0x5, 0x5, 0x6, 0x6, 0x8, 0x40, 0x7fff]}, &(0x7f0000000240)=0x100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000100)) getsockname$packet(r1, &(0x7f0000000140), &(0x7f0000000240)=0x14) r2 = socket$inet_sctp(0x2, 0x801, 0x84) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f00000002c0)={0x7b, 0x0, [0x3495, 0x800, 0x8, 0x400]}) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:41 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xb, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) [ 871.738451] QAT: Invalid ioctl 14:54:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8100}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x302, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x48000) 14:54:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') 14:54:42 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xb, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 14:54:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r2}}, 0x18) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) poll(&(0x7f0000000380)=[{r3, 0x5010}, {r3, 0x2040}], 0x2, 0x8001) listen(r3, 0x2000000000000004) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000003c0)) r4 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @empty, 0xa}, 0x6) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000100)=0x14) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0xf0, r5, 0x700, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9b45}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x169}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x4}]}, 0xf0}, 0x1, 0x0, 0x0, 0x50}, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000140)={'team0\x00', r4}) 14:54:43 executing program 3: socket$unix(0x1, 0x5, 0x0) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 14:54:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:43 executing program 3: socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 14:54:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x200, @ipv4, 0x8f}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f00000003c0)={r4, 0x5, &(0x7f00000002c0)=[0x6, 0x7, 0x91f, 0x3, 0xbc0c], &(0x7f0000000300)=[0xff, 0x5, 0x523, 0x4, 0x7fffffff, 0x800, 0x1000, 0x4], 0x4, 0x4, 0x4, &(0x7f0000000340)=[0x54a6a3da, 0x7ff, 0x988a, 0xfffffffffffffffe], &(0x7f0000000380)=[0x9, 0xb, 0xa0, 0x4, 0x400, 0xf9, 0x1, 0x5, 0x2]}) r5 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xff, 0x208000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r6 = fcntl$dupfd(r5, 0x406, r5) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x80, 0x6, 0x10000}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r7, 0x4) ioctl$KVM_NMI(r3, 0xae9a) 14:54:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:44 executing program 3: socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 14:54:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x15c, 0x10}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r1, 0x8001, 0x0, 0xbb, 0xffffffffffff05a0}, &(0x7f0000000100)=0x18) r2 = dup(r0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x8) 14:54:44 executing program 3: socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 14:54:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x7) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000002009962120003001f000700"], &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x8, 0x60002) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x9, 0xcbb4}, 'port0\x00', 0x30, 0x50, 0x2, 0x4, 0x80000000, 0xc0000000000000, 0x800, 0x0, 0x4, 0x2}) fsetxattr$security_evm(r1, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@ng={0x4, 0x14, "ea9eaa"}, 0x5, 0x3) 14:54:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f5446f6e6eb8dbb22ca2f234517d762cab75b8c03f19b333b325cb1964a0ee8db2b695e83c5e3e524b2bbbba20066199d4b7bb4675062747f0236390ee0f22f88088e78a44fc1852b1ae2deed88e37f77a92f0a8e343bc15a85c418b89c25a3a32fad8532a2e44cfcc8e6093fa078b11946cd9e9fed1a0d7243b6fb0ff143411535e9b473855e89545cae68c96524c67d06c4c892dc212871869eba3b53dd2d258016e27b6839d5fe09980bc9c02ed94fe0a0d7c51096bb3f699a0bd85d86f06000187340f6c45f4309981e0586a71bcbc53aafa9963a2ebba07a85f", 0xdc, 0xfffffffffffffff9) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r1, 0x7, 0x1}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha384-generic\x00'}}, &(0x7f0000000300)="a1493256376a8246a0a0ed7993f8b4f222aa5d14381f744bc73619f51d45bfe73385c873e2caa92786f0bfae67e623883001de70992f6fe94ec47f07d0e106a978e823985e757447f3489b350b2d418d92d0ba41a57ce02c6bd240c86676f2e4f9d379d5ca", &(0x7f0000000640)=""/208) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='fd/4\x00') lseek(r0, 0x20400000, 0xfffffffffffffffc) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00005f5000/0x3000)=nil, 0x3000, 0x13) 14:54:45 executing program 3: socket$unix(0x1, 0x5, 0x0) syz_execute_func(0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 14:54:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r2, 0x90, "f7ace9", "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"}}, 0x110) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x11, r0, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) 14:54:47 executing program 3: socket$unix(0x1, 0x5, 0x0) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 14:54:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') sendfile(r0, r0, &(0x7f0000000000), 0x3) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)=0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x1648, 0xe, 0x0, 0x32b, 0x70bd28, 0x25dfdbfd, {0x5, 0x0, 0x2}, [@nested={0x1dc, 0x47, [@generic="befbcf1b401412968abae2c1acffda85c20a1fac6d553d1c7bdbd551b2a0c49d06fdb1086ac83a7da6dc0c3c3a816841cc0dd52da8fe57fe35b7969fe0a8b5c621376c553860126cb95b9937fb4a7cbb0346639df0e4a3c6bba7f7efa2531463b43a836b6c126529de70d83467c098dbe8366fe08c86a8d73d1c4e28c4042169c7baca9c5da9264a03f7e56c7cf2548c7f33cf48d88e8351260a821ef2f410a9ef1173c19bf9fee064356e1a3ce0db1a77c2bd127de12b4d41a345a8c798bde5af298b9e202dfc8f48d026fbc167", @typed={0x8, 0x7b, @fd=r1}, @generic="abe62187ff412d29dc66ea11974ee3a990662fd87ad2e1c3bd0ede4871ef43b0a2c2233dcc098607cbbc3a4c02b3ccc6de3e06ce8a8d8aec1e79389ad689d4aca08ef65024b468994287e0b730c97cf8c1faab727f4324b5be952236a9f6b5cce2", @typed={0x8, 0x1d, @pid=r2}, @generic="9fae72da6335affc0afc9a3f32950bfb8ed509646a1033177a538537", @generic="2f58e50d80c7db3165e779cb3ad212a70e3b2bbd594dc1fe69dde6c302fdd31b519783d647db5aabd48be22bf08d2d83ace788333ee8ab19cc5621aca64601a67f5001ca8dc5a99d62c9346e17001fefa1be88fadeaf9c5af5cefaa3befea702d19b2f42a05b98b0762b8eb9bd1c3fca32307e6a", @typed={0x8, 0x5b, @uid=r3}]}, @nested={0x1b4, 0x6c, [@typed={0x8, 0x42, @uid=r4}, @typed={0xc, 0x5e, @u64=0x80}, @typed={0x4, 0xf}, @generic="5e03bb8c817b1dbc5e01a82487adedf03c3cff43e631363424de7d424de2d5984ad989245dbad2e5164c07b40a817cb21b2c36fd6daa4686b89d869533fcdf319bc50c61ffd56a8fb63a717a60e042be0eebf19f1098258055b37042f23495e302fb769ceac26efe508bbdc87078fbbdced93ec1c628c7e06faa245d765b3b6ad95a496aca0cc167cb9cb7bac242794fe22fc334c4d943a54ee6d9bd326d82ead63b81f544228e8bdf52e7894623fe98bf8a70819372dd98de39ddf8c84f5ba27dbe0bce26fc120e42f04c96e2bec5f35dee11cdf056", @generic="987234092f610a24bed9db7e132de951f7dfabed", @typed={0x14, 0x4b, @ipv6=@local}, @typed={0x8, 0x8b, @ipv4=@remote}, @typed={0xc, 0x16, @u64=0x4}, @generic="ec367b7b054a6afbcf85adee8796d3f95861aa86c854ad92d296dc3df1249811ebe5d6953ff69ff5ebb603bfd1194bd57d08c23afdcc3e671253f5d5ddf796653b29b9b59f169fd7e04595e755dc7b37f1c2d3ab1933803ab690b94fc71a1399ce993f05e410276e98310feebed124611fa13f3058043144cf446a7c81455f479ec291"]}, @nested={0x2a4, 0x45, [@generic="530fe021f881cc6d98404324fd805e2208528ddd2603dbdda7d5df9be51c561e5409896b6661a5afd88fe1666a259a7d1ebfb489f1f31633c08f812298af30b98a1f9614b862d5c8b85ce8d35b33d14c0dd0a74f9ee27c88c74767de7ac2392b7d494028427059471ea5a85c06e324af9979b3139db14a5848ee745981dd994abe0788a3fd5b8fc30e8ae5616a00a1d5d765de6c85214c05419b4e792858f7555b440eed837d63def554f9de", @typed={0xc, 0x10, @u64=0x3}, @typed={0x8, 0x74, @str='*\x00'}, @typed={0x14, 0x35, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="8661c2429ace2e7c980558dcffa636722c3736cd0adba56952ecd41681103cf20c2bd93672c1491b8dbe2ca8c35163ebb662519b3bb9c0e842cd2058dd4ba5967cd79b75af1e5dac441e", @typed={0xd8, 0x29, @binary="35325be5ea5c6c43b4358f82a2bf44565c88735fd90570d2eacf58b28e986ac9a05560d8ed228fd9e4057b2086d2d8600e3417c45b821d210bc0b4e99c63b42a2de036bddc6a00aa7f6f0f4ca5dd852671334ac9d2a0fbd7078bf0cd3249be3de814cebe295dbe1773b951ccc47d603c294887d86748b5139a1d9e67f3348648ad94d75f491d76c1168d5be0620d06d74fa15d7ea02be25f538bcc87d560c0ce1012ec856902c0f5cd753b819e61f07da63ba2abec0fbc6b8d402657adf89d8d0096e3dad5e5c1e1343f6b9f4820ffb183"}, @typed={0xc, 0x8b, @binary="a99ef708f61e6b97"}, @generic="369c082cf40888025566eff21d508aa6a44533a7bf0c1b7e687f1e65f3dd", @typed={0x80, 0x6a, @binary="91a383aded982dcf5c16534cca38f009dc823ffbfef29f586898f5b296ea27c25db266ca4993b5c2ad50ff22b8f4b62c88204dc7e97fc6ba9843cb02cedac5abfef572655bf3c0b32f9fcdc87534562bbe6960e7585daccf434cb606a4f10f35219f6578fba094fb809834a2f7227654c6d1188f8b256ce13b43"}]}, @generic="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"]}, 0x1648}, 0x1, 0x0, 0x0, 0x8080}, 0x20000000) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r5, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x804, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:47 executing program 5: r0 = socket$inet6(0xa, 0xf, 0x4a1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x4, @local, 0x936}, 0x1c) r1 = socket$inet6(0xa, 0x8, 0x38) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) fcntl$addseals(r1, 0x409, 0x8) socket$inet6(0xa, 0xa, 0x1) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x3eff) sysinfo(&(0x7f0000000000)=""/45) 14:54:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:48 executing program 3: socket$unix(0x1, 0x5, 0x0) syz_execute_func(&(0x7f0000000100)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 14:54:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) getsockname(r1, &(0x7f0000000100)=@hci, &(0x7f0000000240)=0x80) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:48 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:48 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x402, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e21, 0x7, @loopback, 0x4}, 0xd8fc, [0x0, 0x4b, 0x2, 0x401, 0x2, 0xfffffffffffffff7, 0x7c, 0x9]}, 0x5c) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @ANYRES32=0x0], &(0x7f0000000240)=0x24) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x20000000006}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x100, 0x8000) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f0000000400)={0x5, 0x2, 0x6}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bpq0\x00', {0x2, 0x4e24, @multicast2}}) r4 = socket$inet_sctp(0x2, 0x801, 0x84) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e23, 0x99c, @rand_addr="833e7841e17a02236a655b5fbc8cefb6", 0xde}, {0xa, 0x4e23, 0xfffffffffffffffc, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffff}, 0x0, [0x1, 0x7, 0x17c2, 0x34, 0x101, 0x1ff, 0x42ed, 0x1f]}, 0x5c) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) 14:54:49 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x80000, @remote, 0x100000002}, 0x1c) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000180)={0x3, 0x9}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0x1, 0x1, 0x7}}, 0x14) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x6, 0x6, 0x7fffffff, 0x4, 0x1, 0x401}) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:50 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(r1, &(0x7f0000000080)="66ce93c38777095cfc3cc425a8c233ba3e55dd5fe6b6dcfc632ace0fe052ca66aedf11dab40c8d68cde7410ec10d6f2d1fb55672fb3756ed2d18e1e379878b2f331d57b352fc0e5384d6c4888b60eb7839486549385bee15883aac4542", 0x5d, 0x7, &(0x7f0000000140)={r2, r3+30000000}) 14:54:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) setxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000180)=r2) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r3 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000000440)={0x0, {0xffffffff, 0x8001}}) r4 = open(&(0x7f0000000300)='./file0\x00', 0x4080, 0x8) getsockname$unix(r4, &(0x7f00000003c0)=@abs, &(0x7f0000000340)=0x6e) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f00000004c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000002c0)=r5) 14:54:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) syz_open_procfs(r4, &(0x7f00000000c0)='net/ip_tables_matches\x00') lseek(r2, 0x20400000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000180)=""/253) ioctl$TCSBRKP(r2, 0x5425, 0x100000001) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000002c0)={0x0, @reserved}) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f0000315000/0x4000)=nil, 0x4000, 0x200000067) 14:54:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000140)={0x885d, 0x4, 0x40, 0x1, 0x5, 0x1}) r3 = socket$inet_sctp(0x2, 0x801, 0x84) setxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x2) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:54:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000780)={r3, @in={{0x2, 0x4e21, @multicast1}}, 0x1, 0x0, 0x1, 0xad50, 0x7fff}, &(0x7f0000000740)=0x98) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x90100, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000480)={0x10001, 0x5, 0x23008c54, 'queue0\x00', 0x60000000000}) r6 = getpid() write$FUSE_LK(r5, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x1, {{0x3ff, 0x4, 0x3, r6}}}, 0x28) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000003c0)={r4, @in={{0x2, 0x4e21, @local}}}, 0x84) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) rt_sigqueueinfo(r6, 0x1, &(0x7f0000000300)={0x1d, 0x40, 0x1000}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x3}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000680), &(0x7f00000006c0)=0x7a4144b798a4df84) sendmsg(r0, &(0x7f0000000380)={0x0, 0xf7, 0x0}, 0x3f00) 14:54:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, 0x80, &(0x7f0000000700)=[{&(0x7f00000003c0)=""/222, 0xde}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/75, 0x4b}, {&(0x7f00000002c0)=""/81, 0x51}, {&(0x7f0000000340)=""/30, 0x1e}, {&(0x7f00000004c0)=""/133, 0x85}, {&(0x7f0000000580)=""/112, 0x70}, {&(0x7f0000000600)=""/131, 0x83}, {&(0x7f00000006c0)=""/54, 0x36}], 0x9, &(0x7f00000007c0)=""/144, 0x90}, 0x2}], 0x1, 0x40, &(0x7f00000008c0)={0x77359400}) bind$packet(r1, &(0x7f0000000900)={0x11, 0x8, r2, 0x1, 0xd78}, 0x14) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffffffffffffe1f, 0x0}, 0x3f00) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x3) 14:54:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = syz_open_procfs(r0, &(0x7f0000001740)='net/packet\x00') openat$cgroup_ro(r1, &(0x7f00000019c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x80800) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40024}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@mpls_getroute={0x24, 0x1a, 0x400, 0x70bd2d, 0x25dfdbfc, {0x1c, 0x80, 0x0, 0x3, 0xff, 0x3, 0xff, 0xa, 0x400}, [@RTA_OIF={0x8, 0x4, r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000085}, 0x40) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400001, 0x1) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000000c0)=""/103) 14:54:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000002c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal\x88\x0e\xcf\x04\xb53$;w\xf8\xe1\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd9g\xb7I\x12\x80') r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xe4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={r4, 0x7}, &(0x7f0000000140)=0x8) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:57 executing program 5: r0 = socket$inet6(0xa, 0x31ef8fff13df810e, 0x3c) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x440000) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x2000001) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:54:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000040)='fd/4\x10') lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:54:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x400) 14:54:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:54:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in={{0x2, 0x4e24, @local}}, [0x23b, 0x1, 0xae, 0xf8, 0x100000001, 0x3, 0x834e, 0x80f, 0x2, 0x10000, 0xffffffffffffff2f, 0x17, 0xffffffffaae4ba0a, 0x99, 0x9]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x8) 14:54:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x80000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000140)={0x1, 0x1, {0x32, 0x1b, 0x6, 0x1e, 0xa, 0x6, 0x6, 0x52, 0x1}}) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r2, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r2, 0x4) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) 14:54:59 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='weU\xa3B\xe9\xa1 \xef\xa5\xc8Zsionid\x00\xfa\x18\xf1\x9f8\xf6`\xc9\xd3I4\xd9\xd2g\xf8\xa4\x899W/\x01=\xa2U\xe1\xd1\xb1\xb5\xc9{\xc2g\x95\xff\xa9\x87&#\xe2\xc1\xc7\xa9\x98\x052\x16\xed\xb6r\x93\t>\xf6\xad\xa7\xabP\xceR\x92\x9f\xa4\x10:\xf9\x9ez\xd2\xb9\xeb\x97\x02\xb0\xe0!x\xfd*A\xee\x820/\x95\xb5\x9cye\x15se(\xfaR-\b\xcf\x11\x81') r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000040)=0xc) ioprio_get$uid(0x3, r3) 14:54:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:00 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x2, 0x0, 0x8, 0x100000001}, 0x1, 0x1, 0x0, 0x0, "f33efc5aab560fbd"}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x7) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:55:00 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in6={{0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}}, 0x7, 0x200}, &(0x7f00000003c0)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r5, &(0x7f0000000440)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1a1040, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:55:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:00 executing program 3: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x64}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:01 executing program 3: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@mcast2, @loopback, @mcast1, 0x6, 0x6, 0x96, 0x100, 0x42d1dcb9, 0x980004, r1}) keyctl$session_to_parent(0x12) 14:55:01 executing program 3: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xee00]) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setresgid(r3, r4, r5) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:02 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000780)=0xc) r6 = getuid() r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d00)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000f00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40000001}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000d40)={0x144, r7, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7e000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x798ceb4d}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x44c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc33}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x227}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9c}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x20040080}, 0x40) getgroups(0xa, &(0x7f00000007c0)=[0x0, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x0, 0x0]) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000800)=0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) connect$inet(r2, &(0x7f0000000f80)={0x2, 0x4e20, @local}, 0x10) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000012c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001300)={'team0\x00', r12}) r13 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000009c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000ac0)=0xe8) r15 = getegid() sendmsg$unix(r3, &(0x7f0000000bc0)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000540)="5cb03675fab7dc3d9d9ea038db1fad3ac8837ce6c7bb67d15d87758c8084712c860c3a3ed2144ec51e63a07e4f39f2b721ae4f2d44fe520f151bed5c3c4114f315842c1e9cc50563fd59f6c02e3cc05eb3a1c971c71d287ff1ca48b4acc875f8e4086a35566b7272fd6477acaad6430455649ec645d513693cea60b71353935b1ce25ce52fa5ef4eef40fe8b2f85a067dd8718600bdc48ffa7b477751d06c4a3a1dc73163931eb538348da434dbd08a0fe31abf073380941c351b7f02ec684272d9b1c62367d008ce460192f77", 0xcd}, {&(0x7f0000000640)="bc5f43b4a0463669602fab0c7e897c5af089a50d9cc2c9aa5ae94e9e20205e057be94cacdbb8267847f821e8cb8c03356e7ab14d1160fd76a860d974d39b3bbbb52e27ab2ecc70c1111010adbd47184a0ee87e1af46f5af47c7e30bc5dd84bb380a18544c979a2bbfb439eeecb51f21c4346ac335a02540e66ff5b6e35b0380d56c4ea2770b14741b51f387a0c11c506f67806ce24d6441429d851c75e38a533119b84ebaf5f75260d6d922f0e7b46c8", 0xb0}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r8, @ANYBLOB="0000000020000000000000030100000001001700", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r3, @ANYRES32=r1], 0xa0, 0x20000000}, 0x48084) 14:55:03 executing program 4: io_setup(0x3, &(0x7f0000000000)=0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x802) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x1, 0x2) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x6da1, 0x0) socketpair(0xa, 0x2, 0xd6, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x40, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r8 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x9, 0x10002) r9 = syz_open_dev$ndb(&(0x7f0000000880)='/dev/nbd#\x00', 0x0, 0x404000) r10 = syz_open_dev$cec(&(0x7f00000018c0)='/dev/cec#\x00', 0x3, 0x2) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = syz_open_dev$sndpcmc(&(0x7f00000019c0)='/dev/snd/pcmC#D#c\x00', 0xf6, 0x0) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/kvm\x00', 0x408300, 0x0) r14 = openat$ion(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/ion\x00', 0x400002, 0x0) r15 = userfaultfd(0x800) pipe2(&(0x7f0000001d00)={0xffffffffffffffff}, 0x84000) io_submit(r0, 0x9, &(0x7f0000001d80)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0xf, 0xffffffffffffffff, r1, &(0x7f0000000100)="475581439e7ee1d748313289e467960514c4d5e8f6accd6652175e7fe7c89fb5afa46c8e7356bdcb5f2ac774f83b855552275dcbde62b7f276c70b9b39b13120e30bb7c9a0ee234dd831dfa3b0ef71295597222111af0894b78715e9a48086e705035ea90524d5e89a94acc2bb31ce325de00d0f77e3aeb53870fe27bf37276cbaaca6009ca0bae6a4920d8fb4e6db1cd89eb8ac622a214627649f1bed9011f46568e28dd39936f65b248fc3a0f2c6c96be8fc50652f5aae93758d9c6829bc9ca61d815e3f1b7b3e3f20be4a81bb", 0xce, 0x9, 0x0, 0x1, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xa, 0x5, r3, &(0x7f00000002c0)="52f989bac742949e94c32df4", 0xc, 0x1000, 0x0, 0x3, r4}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x3, r5, &(0x7f0000000640)="93880b44bb117035612ddbf99510feedcd087f142120bdd8dc0613f195c081446356b94d82b905c793b138d2ed9c5437ff667a28c1c50b964c2cd7b65896fd4e155ecf86156765ae52337e137f580a3ab8d231e56805b4c4399c3ddf20d5a053c9a989f805f09d82b984aaf36ecf757d504054", 0x73, 0x4, 0x0, 0x2, r6}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x5df51210, r7, &(0x7f0000000700)="954d8d5e6a36b85000fa3105271f13b9e6e9d5a67ec305853983d504e74c00a5813d07b8eb8398bf0de56896412324d7888f1ddba173fce266eb0d2dc5ad8e1a694fd48ca94a87682274bf5e3576633bb3214098efb7bf90e4e40e881a06f0052f3d7a175e0ad2ac6db6b42907642db65b0628e72883b4c92e48b23cc47271749eb5661324c55444025be4aa4e6872d85e00263a9fea7f0b9d6d5e98c5fda7d593010565b9928640add43601dc7b23e60a540be1befa4d8a60a133a786a6704a366cf1ab48f8f0033f65f65a804897ea768e761781bbd8a9a18df3e2d9", 0xdd, 0xc000, 0x0, 0xfe6f4a372ed897f9, r8}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x5, 0x6, r9, &(0x7f00000008c0)="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", 0x1000, 0x7, 0x0, 0x1, r10}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x6, 0x7, r11, &(0x7f0000001940)="3cf871bb6d0fb82dd49ffa0098499ae69e4414a350e5fc5fff1c9c605e75b05e6727157550f809657d3ad5f279dcf224542c9b0354f25e7946e88f3542b8dd4532e1aea27635c77c01aefa65", 0x4c, 0x5, 0x0, 0x0, r12}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x1, 0x40, r13, &(0x7f0000001a80)="1b042cdfaf0c6e4c67c458280abbc1cf3d074db35bb6ea7e3785f555508b893a50ed1f5269f6143c0b0efd1c7c5b046c3a941255c61109e6bd68a2656bb499885d36a7e5f810f1dd3ed6e1499aa0cb43bd391364bfede3e6e6c19a9e1139b99bf1bb3c9df238eb3c2c3ecdc3", 0x6c, 0x5, 0x0, 0x2}, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0xf, 0x2, r14, &(0x7f0000001b80)="8f2164e07186ec44499c7ba6af47662920f76a902358f23f6980bbd24f6ef3d89b755a6c117ae5a6f4c4f00476347b4ea12f58744d9185be8125ece7f9de46582c01a072d878568c9b54611b5e18afc903d98ee9f071aaa065da33035f1e85f55474a4dfecee20c0b6490e676f0f5c616bcbbe79ab0174a9d35f9551c7a15a781f", 0x81, 0x9, 0x0, 0x2}, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x3, 0x2937, r15, &(0x7f0000001c80)="84ea2522b6f9f6bd685df39a096c45fe06bc72e76185a02a06edcc611b24a1629abaf6b109a0793905d286752d2d9739b2fa9ca3e22111d71348b9eae59ce5029057fa2923", 0x45, 0x0, 0x0, 0x1, r16}]) r17 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r17, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x5, 0x8, [0x6, 0x4, 0xeef, 0x40, 0x10000, 0x0, 0x9, 0x3]}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x5}, &(0x7f00000000c0)=0x8) 14:55:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in6={{0xa, 0x4e24, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, 0x2}}, 0x3, 0x1, 0x3ff, 0x7, 0x10}, &(0x7f0000000000)=0x98) ioctl$int_in(r1, 0x5473, &(0x7f0000000240)=0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={r4, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x1, @mcast1}]}, &(0x7f0000000200)=0x10) 14:55:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) write$P9_RGETATTR(r1, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x400, {0x0, 0x1, 0x4}, 0x80, r2, r3, 0x5, 0x3ff, 0x7, 0x800, 0x0, 0x58b, 0x7, 0x100, 0x7, 0x1, 0x8, 0x0, 0x9, 0x2, 0x7ff}}, 0xa0) 14:55:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000000)='fd/4\x00') lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:55:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x180ffe) vmsplice(r1, &(0x7f00000004c0)=[{&(0x7f0000000040)="c26d343d615def7ef5f80eaec3ce9869464920c565039959a2b0b5b243e665ceeae81dabbdb44488c3bed8a387e1a3fac61ccf0f94cfcbe2981943b99681b9a03978ce0299ae7c3c1c8e6057624e88bf7eb402e00b1bca437794fc97be2e755abcefeebc85170667aaeb1ecb36a0d69646459e26cafe", 0x76}, {&(0x7f00000000c0)="a761a63912a4a9041f6a09b9b8057f942b7a908203cf3f4fbf00672fb07723a2022527bcf47453cb99bb398e790f7e079b75a816ba8c189f9637be8cbef114162fc7ddc96b6882304b35f76336ff29e7e7ca93855a32ee89f1737e20d11d", 0x5e}, {&(0x7f0000000140)="a373fc4d000c58f2954b17c2d77cab4a70956dd2c413fa39faf453648264a6a3f03927eaa818f89d951eae5fd613ecef6ca029a8839915bc920d129d7dbbeaa85b3c659d015434646fd836d3d89945605f6e23c5d6d2976876de77b89bc411b0cc7a679ae50047bbe986acb1a689817c655fe160f338d1c9fbe4f5f5b2a96c36dc4cc007148b7986123cfafa4f350b13b4ddba399986d0ea5f03510a2adef9f7b3039466c4763400485b685fc43144f8f0da2c57d29ad694edb64f66febc18dfa8784eeb7e170f38e510e8bb5a7d17364fc0cd915e14838132dcafd41e998445c8258edc04e5e5a81bf11c7ce3a0c5", 0xef}, {&(0x7f00000002c0)="4b041c1e52dbd67e2720897b99d053fc121e2c5dacd5cb225c8d8882220cdb9aca19d94bce06a24f5a7f7e98ff034b650768c954fb9be0b508432deb4325a3502ea6c6638d9a0c06d89385ce20e7e37b089d25445e81858d18eab71f5fce0434", 0x60}, {&(0x7f00000003c0)="b72e7bc47c63474c8785abba089a09136ca5aa2c545349208b11ee72babf7923f5590e46be6144f8c3addd636b2f8dd7b6a506065c42e474a7a27ae49f1a58715bd5994b773f9453f1e6c1c5f7c31f07846fee961cb89592ee9cd29b3ae537618a930310dd2b33415c4b88b2865be6f80b12a4978665cca21b4b79360ac7d6abfccb1219f02cb3ffd11113ce0eef42eb1a03723eb7f4b63cc985a311fec665724a2a83cfe5ef25b0424826066873f0ae213dbde48f362da01ea61461d600e25e7c1cac3dfad2d4b12b844834978e3f6ca5e48a3f30c969fe863375ab611f948068ea32596c73fa", 0xe7}], 0x5, 0x8) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:55:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) modify_ldt$read(0x0, &(0x7f0000000240)=""/164, 0xa4) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:06 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000080)=0x8, 0x4) 14:55:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) r2 = semget(0x0, 0x3, 0x400) sendmmsg(r0, &(0x7f0000000d80)=[{{&(0x7f00000002c0)=@llc={0x1a, 0x32f, 0x3f, 0x400, 0x9, 0x1ff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)="6b4e71d8b47cd18541b990c653563d0ae78d880297388300f35c34e7b8bd16ea9e0b1a5c1bb4474c13215bbed3c2fb1d5b498fa4b318a98555a7c4e6c1f1edd35256406bcc20b5a0f5", 0x49}], 0x1, &(0x7f0000000240)}, 0x10000}, {{&(0x7f0000000480)=@isdn={0x22, 0x0, 0x6, 0x6, 0x8}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000500)="ca979fb2440c4ec9f1cf069749193a1f57f5df6b9310240c7cf8c091b78c3aea01879569a03d1b1721bf05c5d0dc6acb71efbf188936c7e04f833637becf568ea83e6ccecbaabdb4a84f0d38ab9b802e25550d31075d738cddc7156eaa5b500a6a8511a17dedbf5c19b8519d294cb1d90098503431345a54866d7bc57fcef3e9d8b5fe63dc2fe3f8441507576265ce5ba541b18825dcfa609fb16ea4e9e0eb139b9999e344aab2df3e1ffaf239b61578e630e4fa6b9ee0e870e67eb4e5c1fbc630e6123d054a822c4b8601ff3e877cdc8b59440737", 0xd5}, {&(0x7f0000000600)="dd100d9d4b03f2c8a11c29dbfcf0400eec6a627be3471032dd450fbc62470069c0b6e72c566e9e24639ebbee046d55b5560a667ea1e86001118d8f71a8863329280eddab37e899f3f506bd0f6dbbaac9740f145380e4815722586c48831eca30cb48ac78fde4f5648a124d0f17418105fcfd29f57b3052a1a6d6", 0x7a}, {&(0x7f0000000340)="fa927a4e9aeefa1e78a955827ff9ab9a545f4857", 0x14}, {&(0x7f0000000680)="ea3418dedc2648eb526581a7ab388326abb2d92df176a7a25cf62b6c2fe892fea4cee2de64c1bfe329cdb82b810ed10cbad8f5907b3a7673c1cd8260eb7b58b917c8172fc8f28ed41c45dd7225c9a3af1eadea0badd0e9e24af84e", 0x5b}, {&(0x7f0000000700)="5433b6a2e7b1f282af74110e4dab199e762717a57781c48edc1003d2e1bd9f57761ea36f79db203c39cd25683fb1e7a1e634012401a0f9319c4dc64ad5896c57ef6b2d4acbd30c1c5cd2d9a2796f1171beaecab40abbbfe4508a8e03cfc2cedb2786318c8f5ddab7f7aa", 0x6a}, {&(0x7f0000000780)="eb35402fcaf375e90afb28cf39df17a4f4", 0x11}, {&(0x7f00000007c0)="1b70c311f91669127a644ac7a52bd1da4b793d051c3946891cca62c48449543238145998014b62eb8dbcbf60dc4118a727e7251f19657190e8286e7ca266b0fe5302157d4a1cb18f31d924d77bef651f50cefa5c8b1cd1908b8de782607a8e477da83b061be5886b7ed034595f2700e9031568d281b5d9940cc2dca1f72b7666ccfccf86eaa3fe041b16a44cd410e32fd402a98bbf66f0e58ca4f40691c020f6d88de5011dc2761702ecfd33806e0dfb5fff8e831575b91f7e78d7477ed1e19420ea169de8d1de2c07eca73345", 0xcd}, {&(0x7f00000008c0)="d42d2810fbb91e59621d5ccf", 0xc}, {&(0x7f0000000900)}, {&(0x7f0000000940)="4791951503ec88310c7eacd3dc78728a245530790492f49b23cffe5597bc121204a8c74f0ae53280e08165ab51ef23890fe87597d258", 0x36}], 0xa, &(0x7f0000000a40)=[{0x50, 0x109, 0x0, "16a9c8b731a2fe8bec9227006921ad4c8d07087159486788d5ec566b270b697d4171d2ba1306f39e47ea1228fb38f77a075c6ac0a6725b29d379195b9b80"}], 0x50}, 0xffffffffffff0000}, {{&(0x7f0000000ac0)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x10000000}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b40)="7db174975bd4372d46aea8fdc4e67143834d30af9d127ed5fc77614ba1611241107cbda2e2d4a2e487ef8126d30f5a5c", 0x30}], 0x1, &(0x7f0000000bc0)=[{0x50, 0x0, 0x1, "ead8cf6f5d1efbc7c7132717bd4b07048e3cc3554a6c487591b2cdd4214ab8bbc076003a4a9aafc41fc27614da037d69936a706a07e8636c3a"}], 0x50}, 0x6}, {{&(0x7f0000000c40)=@caif=@dgm={0x25, 0x3, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000cc0)="6db3d2b85cdad5b69f3ccbbd3713a4a1f9ec58ac7d5669edbd9abd1c6e55e2f491f3a432b96129128e6e401a303d95fdfbfa53453471c15ac7b9ae31f5b00b2745ffb254195953be161c205f9df573786a410b9a2babe7070ab72d99bf4af190716fe525f0390055a45364d4d9863cd54aeb105b06", 0x75}], 0x1}, 0x9a}], 0x4, 0x400c000) semctl$IPC_RMID(r2, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r1}, 0x14) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x80, 0x0) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000200)=0xfd) 14:55:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:55:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/connector\x00') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000001c0)={r4, 0x29, 0x100000000}, 0x8) 14:55:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000140)='md5sum\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='smaps\x00') r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x20400000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x38) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x4000011) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in6}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:55:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x200) pidfd_send_signal(r3, 0x14, &(0x7f0000000240)={0x34, 0x1, 0xffffffffffffff97}, 0x0) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) socket$bt_hidp(0x1f, 0x3, 0x6) timer_settime(r1, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) socket$pppoe(0x18, 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000140)=0x27, 0x4) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:55:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000002c0)='bcsf0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2, 0x0) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0xfffffffffffffffe, 0x3, {0x7, 0x1d, 0x1ff, 0x2000, 0xfff, 0x6, 0x3, 0xffff}}, 0x50) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0xffffffffffffff7a) getpeername$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) bind$packet(r2, &(0x7f00000003c0)={0x11, 0xf5, r3, 0x1, 0x98, 0x6, @broadcast}, 0x14) listen(r1, 0x4) r4 = socket$inet_sctp(0x2, 0x5, 0x84) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:11 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x101000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x1000, {{0xa, 0x4e21, 0x5, @mcast1, 0xffff}}}, 0x88) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f00000002c0)={0x8, 0x4, [0x2]}) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2400, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="c441cc1500b9a8080000b800000000ba000000800f3066baf80cb8c4821d8def66bafc0c66b855ba66ef48b89fc741c6000000000f23d80f21f835c00000800f23f866ba4100b8644ad9efef0f20d835080000000f22d84e0fc7aa8b0000000f01f8470f44370f20d835080000000f22d8", 0x71}], 0x1, 0x22, &(0x7f0000000100)=[@dstype3={0x7, 0x7}, @vmwrite={0x8, 0x0, 0x4, 0x0, 0x6, 0x0, 0x20000000000000}], 0x2) socket$inet6(0xa, 0x2, 0x7) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000240)) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3f00) 14:55:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x149\x12\x18\xe7\nT\x91\xda\xd3\xf3?\xb1\xcf\x86t\x10\x04\xeb\x1f\x93&\x96\x1a\x06\xe9\xfc+P\xe0\xac?\xbc\x05\x10I\xf9s\xbb\xb9p5C\x15Z\xef\x92\xd7\xfe\\\xbe\x17\x8dc') lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xa) 14:55:11 executing program 5: syz_execute_func(&(0x7f0000000b00)="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") openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 14:55:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x1ff, {{0xa, 0x4e22, 0x7949a5f9, @mcast2, 0x3f}}}, 0x88) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='g\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0, 0xffff}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000380)={0x8, r4}) [ 899.969882] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 906.615160] FAULT_INJECTION: forcing a failure. [ 906.615160] name failslab, interval 1, probability 0, space 0, times 0 [ 906.633907] CPU: 1 PID: 28665 Comm: syz-executor.3 Not tainted 5.1.0-rc4+ #2 [ 906.641157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 906.643789] Call Trace: [ 906.643789] dump_stack+0x173/0x1d0 [ 906.643789] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 906.643789] should_fail+0xa19/0xb20 [ 906.643789] __should_failslab+0x266/0x290 [ 906.643789] should_failslab+0x29/0x70 [ 906.643789] kmem_cache_alloc+0xff/0xb70 [ 906.643789] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 906.643789] ? vm_area_dup+0x65/0x1a0 [ 906.643789] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 906.643789] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 906.643789] vm_area_dup+0x65/0x1a0 [ 906.643789] __split_vma+0x1cf/0xb40 [ 906.643789] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 906.643789] __se_sys_madvise+0x33eb/0x3ce0 [ 906.643789] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 906.643789] ? prepare_exit_to_usermode+0x114/0x420 [ 906.643789] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 906.643789] ? syscall_return_slowpath+0x50/0x650 [ 906.643789] ? syscall_return_slowpath+0xb2/0x650 [ 906.643789] __x64_sys_madvise+0x4a/0x70 [ 906.643789] do_syscall_64+0xbc/0xf0 [ 906.643789] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 906.643789] RIP: 0033:0x458da9 [ 906.643789] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 906.643789] RSP: 002b:00007f6eac1b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 906.643789] RAX: ffffffffffffffda RBX: 00007f6eac1b2c90 RCX: 0000000000458da9 [ 906.643789] RDX: 000000000000000f RSI: 0000000000002000 RDI: 000000002029f000 [ 906.643789] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 906.643789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eac1b36d4 [ 906.643789] R13: 00000000004c4c57 R14: 00000000004d8780 R15: 0000000000000006 14:55:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @empty, 0x5}, 0x1c) 14:55:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 908.353976] RSP: 002b:00007f6eac1b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 908.353976] RAX: ffffffffffffffda RBX: 00007f6eac1b2c90 RCX: 0000000000458da9 [ 908.353976] RDX: 000000000000000f RSI: 0000000000002000 RDI: 000000002029f000 [ 908.353976] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 908.353976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eac1b36d4 [ 908.353976] R13: 00000000004c4c57 R14: 00000000004d8780 R15: 0000000000000006 14:55:18 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:55:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') 14:55:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1400008912, &(0x7f0000000340)="0adc1f123c123f319bd07093e7c8aad78bed4487ff7a146403eb78e2423f05998632e17a1457dad6b0ea695df6a8a4c2f7c3bf9cfa24a49d46f001f4903a65edef58bfacbdd10aa8b0e304d3374d989583cc5e88c13bc2ec7e6ccdaa76db0db69d771c0effb78547976ea4eb4d07869d77a99ff8828b4b123e61870b97ab661cb8a4a80cdf9650be4c52c9951cb6263426c574aef9800c68ab374f2c4ba9522a0fbb94f105c67b2e01bf04f854a72c746c0c8cb3cddeeb6c0a9ed6a02f3796c130d5f9125043718167800d6585d0aee553696150d101b4668f4ce958602fbb8e") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) [ 909.467693] RSP: 002b:00007f6eac1b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 909.467693] RAX: ffffffffffffffda RBX: 00007f6eac1b2c90 RCX: 0000000000458da9 [ 909.467693] RDX: 000000000000000f RSI: 0000000000002000 RDI: 000000002029f000 [ 909.467693] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 909.467693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eac1b36d4 [ 909.467693] R13: 00000000004c4c57 R14: 00000000004d8780 R15: 0000000000000006 14:55:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1400008912, &(0x7f0000000340)="0adc1f123c123f319bd07093e7c8aad78bed4487ff7a146403eb78e2423f05998632e17a1457dad6b0ea695df6a8a4c2f7c3bf9cfa24a49d46f001f4903a65edef58bfacbdd10aa8b0e304d3374d989583cc5e88c13bc2ec7e6ccdaa76db0db69d771c0effb78547976ea4eb4d07869d77a99ff8828b4b123e61870b97ab661cb8a4a80cdf9650be4c52c9951cb6263426c574aef9800c68ab374f2c4ba9522a0fbb94f105c67b2e01bf04f854a72c746c0c8cb3cddeeb6c0a9ed6a02f3796c130d5f9125043718167800d6585d0aee553696150d101b4668f4ce958602fbb8e") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000003c0)=0x2940991f) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x40000, 0x0) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xc, 0x10, r2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0xbf1, 0x7}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000300)={r3, 0x3}, &(0x7f0000000340)=0x8) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r4, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) socket$inet_udp(0x2, 0x2, 0x0) listen(r4, 0x1) timerfd_gettime(r2, &(0x7f0000000400)) r5 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r5, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) fcntl$getflags(r4, 0x408) 14:55:20 executing program 3 (fault-call:5 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 910.631865] RSP: 002b:00007f6eac1b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 910.631865] RAX: ffffffffffffffda RBX: 00007f6eac1b2c90 RCX: 0000000000458da9 [ 910.631865] RDX: 000000000000000f RSI: 0000000000002000 RDI: 000000002029f000 [ 910.631865] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 910.631865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eac1b36d4 [ 910.631865] R13: 00000000004c4c57 R14: 00000000004d8780 R15: 0000000000000006 14:55:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') 14:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1400008912, &(0x7f0000000340)="0adc1f123c123f319bd07093e7c8aad78bed4487ff7a146403eb78e2423f05998632e17a1457dad6b0ea695df6a8a4c2f7c3bf9cfa24a49d46f001f4903a65edef58bfacbdd10aa8b0e304d3374d989583cc5e88c13bc2ec7e6ccdaa76db0db69d771c0effb78547976ea4eb4d07869d77a99ff8828b4b123e61870b97ab661cb8a4a80cdf9650be4c52c9951cb6263426c574aef9800c68ab374f2c4ba9522a0fbb94f105c67b2e01bf04f854a72c746c0c8cb3cddeeb6c0a9ed6a02f3796c130d5f9125043718167800d6585d0aee553696150d101b4668f4ce958602fbb8e") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x97, "54837a283f0ae4fd633ba694334c79940ef7dd75d3e63dab97ba94ea166ffb308d0d9c45080413921948fe9e6427d13ee59a0fef4655d92b5e17bee8ce997a2bc524bc0d0e8d8f1c343ac7c6ba16a88b70bb203fa4f350a2673a1bc7846d6cf940802ec2a7509a436ad3eac1ea6ea6ad5be6f2a82bf9cfd6e1fe1529a238c6b18011331948e1326423b7dc2702499e9982844ed1ca1da4"}, &(0x7f0000000100)=0x9f) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x6, 0x5, 0x0, 0x0, 0x7fffffff}, 0x8) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x10, 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) bind$inet6(r2, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r2, 0x4) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x301080, 0x0) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000280)={0xc2ab, 0x1}) 14:55:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', r6}) 14:55:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x27758fd232b5d04c, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x7f, 0x0, 0x3f, 0x0, 0x8, 0x3, 0x100000001, 0x0}, &(0x7f0000000400)=0x20) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={r3, 0x1000, "39d557c4ea1863d1f2efb6214a8ea7cace4e12ac8771cc461eeb4e2b2fcd298d7029a57a16204a85a586b8bb4e0473d01375575932d71c5f4f21303a7b4af44cb51ef95c2d203032ff5b049d47edc3b06b67aba151a791137f18f786757f07f5f78f9447a97eb1a2ec1f7b84c133538e7fea10909cd23477e14e4a6ef5d6a4f438186c9e0c3cd40f999567666f6a75cfeb260c3883d3e25f16350849a5083ef637b2b9e15a889aae1247b0c4e1c278d032f33461a92ce52f818e03d98bb01ff74887b6a0eca9ccd9f53f335cc33c27566653b83a3eb5282d74332a2ab0a840327864a74c22f54664d222c7178cff97fa8e164e039e92cc9625bb2ad76377c01957eefd293a433fc41d1711d798a5ba8b3194bb496c151133a7d4eecb4aedc76d7b4e6045c5d052ffab41a22b523216c726f3adf44ce13dee98e0885b7b389673b3e431be61ba8f31dbda367aca06ee7490d4a4c976cbe93b6ccda03df2d0694cd4fe99ccf112a4eedb3cddbc6533300cec6aa8aed64bd3b2e864bf8114dded56298c4d48b79709d3a1161f7fc1208fbeaeaa65052d59b57cd811893752949949a5c44fbe1e726b0fbfb52f4cd1c7b9ea9272546812f921d459f39ae92465b708918d2bf05948b6b2f0b6ab1d23808f70f6a29e412ad81a28d65fbf6a84c8f0344bc7984a3bd93f5872e120e0f569479e68df97f0dbed092ad9f0705643e39e7c371149a7029168c2de6a5cc487608fbbc25c959ef100a664af7b3ce9d71dcc27a95de32b1bc05ee546149cc872023a66ef0b6346fe9b87408cfb07e7aca435bc5a09529ccc916492de547d7bae279644f0ae5dcdac8b953c6ec9b1f1c6af8b2749e7988fe1da9ddc2b22eeebcb999b379be6aa213dbe58c2da2a670d898fc0a13592e4bfcf21d17838a0200d8688ad01cb80e67f1fd3f659f4d1519bcab66c45dda70793255e8cb4d8ddaed125154505b05166a165b085eb28b63ba4ccd9bdb07a26b9fee7c49b0ef3d5785b1d78f436f3a11dc7c38dbf98003a25a0f3c875c7886340aa7effe8b3be3dc62fd5f997db5a58001b1e1e39568d7a2ac5e834607e5021c0f279769c1b7289b55119bbb4d1706c73f2d3e8c1ea51e243e875a657d74379fc8247bdd99ca4e3d70026fe73337b619722e143eed218703e4c70b235b3cb9758863c45005a63531294e7449fc3d3a90cf12f99278a4d082ce1f26f40ed33eed79710ec50b3537fa14996813bbdbc053105a4f20d44b019ee39d992061786fb2c70f18fbd04047c55ba3fa056e794e38630a00c0f6a59c1fc9b461cfb61e6fd3e473aae05d2342a4c1ca1b82bfc1982707d5f0e9af882781aa0a18e6219034a1d58b3099f60270672a1d8fce6aa1a22d5904abb768472b2568d390acf1dc240ead45ecd6060ae20bae7c083872372ed686e04337cc0c5487519c36f423da0aa161f8d892ef80cbdc6fc8da21ff2f1a58ad3ec9b4af60f0d73d9b7d0c3455e9b5dcc3a8a9ab2a0fcff676804164e79e1ba275b62e6affc634d5cc81633bffb13acd3fb209c60b4395134b6b8519d93638734734670d94ad3aa557885c0d6d51c510f82985c06f5aacdb341812b0349c88dc897b750ff2e8f69796663a8e41aa0304cc502d854584ce1603b14f9f623e9422b0b78d049ff0c64025f755db1f0e68053c2059fedbed63caac3dc60ec1043caebd3cfea739be51b12cc2ce074e4b1115158fcebc51a7164e53a3dc6fe00ae6b5b160ccc798a8f13fc30999d1c3cffe1a4b11b33af2593c0dc15e70c9b9ea9bf0aa85426543200bb849e2dc864ca79808dcd90e7549d73199a2f0974f28f074b7ccf137456ae476292d54a529919aba3719888a93dcb88689052ab06b6e77b622059fa229bedc69df32fdecb9eb2ba8b38274316a4ecc393235560f28d17fb2ecaf135772adadeff3a691737a1be545501aa0f62e2620024c3112d563042480f24f84382ade93892425999586e7c464ad4867154f4e206908f78da962446b2c31290b3d5f0c59799521370c7c48d7b707e700cd3339d11a14b46ff38305bfdd8afecea8fecf6ebb72e1a04ca93dae7dbdbd723823ef33d2fb29307e99d7a15b6b54466419bdf08aa3d7840544df92d1e5debd410d1f5e04a539d87813100c23082b1c0858c70212f07f81149f298ddf0f9b8ad275b7f7e1c5c3dc929e1e63bf7df9c678869ccb713bb299122783dac5ffe866f749c5d21e93a8fbcf46cbbee3bed2c0f0c1cf02115a29b21c8c9f6d250c1edba5bd1bba7ad5d76b7013e8c1a29906ba303dbec61dc5792989e93382d1bbc541f2d83e7a1db8cdc880928464827419cf40571f0d5d9db93d472b4cca0154aaf92f523a9e89ffb466fe7d250366ea5366c205158306259a6ab999237f385be332d13892a16cc4f0a640d5b2815afe3c5e0e51e07486719d106d50e4dac0c5a4749f18497c39ef8af4508145c67b073932823b1ce5db695153cec043dab627cb81cba9ae8c169e551713777373c582ad6bb1e0fdd5ae2aac8fa3971188016f28750ae4463adccf2e459fd593663c9c4c9a321c3409b91e8891d3e0d93f78d50dc872da3da319d4ef8f08f2326a808760a52e8ff2b701d1ad42cd8316b9d92ec0960be31afb1fd2a89a7bc6772b6dcf916140f8ed1762c4b8b3e1bccb80da8f62053f7a14e06fc0b60078b2d9a83aaebcfc976dccb4934b0d62f2123d3eababfc94532d0f959652b879a8a5a302ec06f44d12de2e946dbcfd9120e998ddc6f95e84c100d14ec54b8b99939b08e65bd77f4aa57ee68295135674205ccaf7e175af327c3481e2c0b7846273718565cd1049dcaf6dabd2905f79108b4845ba73c36e4e81d06b75eed2f70ac6032b600bdf32f8e0d7f3182147d561936c5f3a7bbc836a9efbb217ea528a9012b946ef03003dc173da42f1adce6f7afedd840123fa1e74ce215006f4d25ef73bab8234aadd2b61d230cac846e168f4c3d89504406f34a1a23dedf76c4bba1555ed8f49b2043ad8fed2f52deb8f63cd29a544463b095a73d708f0dedd36914b4200208afed455da9bcc45862c1259d827fc8d9fa82305a4365d3fdb584c36ccb9cdd110fd8e7ced66222f20ffb014d5063812c81f0ae2aa0a2e88a97a45186db509bb4b76cdb38ec28fd6ff143e751572c71dea9211197222e3e8f43b52ebe706a4c14d6c0b34ef998b41df8079f4cb9dc03b86ca6809793eda0c25d254b6779db04bbc94d73a2053976371ab793da0a3e97253cbff02043183796fed21fe163745edba38a80a91bc7f6048898772f7f0f78407b4b774ccd9cd467ce128c2bffc44a40f185d2c90bfdb073b7056362db77f86485c666ee70b70cce166ac088c6c474c6a86fdcaf682a0138c2208cb6dac776590a8ea7935cd450dd1ed19c50392bd1b80d287939c800b02a9fd65d8752c2b4fa95ffc9cc8b4c97f5f6b0b9152da6a671e2708d82424291441bcf58ef45fc087ba3fce1478d0711d3f03a84a809b7d637097b06c3392e735fb6e23090a2a708a85dad8d2e308d76036bfda3efdc84c6f58894f0db0dfef987c3f48c5ee0943e36ce968af980c9920d83238f39d7140d3279dbeb51c576d6e79e2cff5e761369e12a5f36c0b3134e628bd3712c14baccfde3b3b39b77318160e8333961e72f23ddf2fd7ea76d63e5220f01de9e679766d51280e84142a859fe6dc6a495df841ff17d276abbe711b50f60e7760fc30e2ef92278f6f4fbf0e98ee293c0d9be8bb71b8171a5869e244b7fdeebc98ee16f3667890d6bbed000046ab905c94c3d126ce3f7ae10c61bde012078c4c5d0410be5fea768b6e6f098f81c640d3f0652b6f6eb77d5bba8a620220709d770ae4e1df1a49be6a97034bd5af08ce67657435efb3ae79e224333c83c613320f7e5b1a4afb895a20b36eaf4e6d8c5909a256fa55ec077b8ef3440e1fcaf0b876158fabda54d0eb665605ba3bca2088471df9d59418f2228058bf4ae006d8cf0b3daae11c7204e059822e8b18240a57324c8598599751ef54bd5c9b5c1c41617f1aacc3344fa9da54b77402181dd2aae4e987b6a50d27b92187c2fe26bb623b82e1d70e43fe93ef0ca6ff45d49d0c6f4c1804e5b346ab81398390c3387e7600175244e1d675aa6011bc14d9428d418551a489d5aafb2b20159385aa468d27d4530c91087525d68c9781bc3cc51b926dc26a1483a706bc50d56279efc660f86249506cac67d9f5a548423d2a758e428968d4b75c576fb32437a0544859a79c22936b0821416096261d7ea44e4f3db3790a74aa7659f45b85f6f968282eadd897ea6c8cc15164031053b3176d226187e6477a65502394849effdf3686d77acdc8d2d7a9673914a0a29eb3fba680db750bc815582b7ba25cedb34c8b05fb5ed3d4862014d1f7b210a0fd059d4c33d85b9a375d23e0a6a1391279fcc41d32e0501b9e826ad899dcaae67e4ddf206ca09e32316a431dac56a4875b17e8243bfd5a33821d53b1a58181e6cae106b8d946f1a9a635c5472fa595724a9892533b738d5f7f481e0032fc2329b439ce1b4a2d59822da0f4d2f78cf85d2845f2d79dbb1a09ceceab0773392e3bc025217878a49a247fe549281e2fe11ffda23481e2737cff1246fbaab2cff099d024b0649ef537e8b7574c2eff70db87227f2c846056c9ffd61e9558d6346ad6e465f2e7b9e4feac984f87fc2018e16ecade15299da2fefef12c5c446a6d52ff36032b0c25d039252e470d892ae79e82d6d1f08f6c941d748a132fa316f50c7d9111fbd96387a7ed86ed2a6ace0f3daf943113ad172490c1bfb6f8fe35878c9f787fa6ffd75378a7298857fee19c0f2b4f3d88bf37456fa96fdc5b6f8fb1470e1989a2f04836548c8007a5bd490770d694278c62c52aa860c442f90996c97fea39ce9aba611e1e7248f70ec31d6ab544a18727f4c6ac68ec6404bf48c19b7c04f4279bd7649a2a5621c3a45e5e1eca57bf60e859e6eeb4a176c4d71f9dc88002dc028b871f23f8cea3ac1c96a5ddf0162d65cef6e1b6d98ae5485fb144c5fd6308eebbf19ff2b48c69faa24c5f829540495e45b958a25747fcf4fbffc625be29b108089ab7d02c57c3b888a3a41d818aaf8a5b84a3c1f2dc9036784ef9c11dabf18b103fbd201d17f924897997728af367094a1a873c1f924a03ae8bdec12f8162bbae361e9f1ad83c15171c92ca168c7eaef68e6a951c4b7ed2ff9103824e9def4ad4099aac4127bec7f7c711ec9f0a4a948f9e5f2c1adabc94e9ad6f69b87dec2173c03b10c4dfbde8239fbacfebf9d70ddbcdaac139bcf4a3cf989fb841239280a7849564ee9a56b7125baf7622d72cec5bd7c4becdac73857559dfd0059548c619c1a0e8985ae74c1bf6c5234ada9b7e65c6faac836806c1ac4f92c907b44ffb7119244b48f73bea1b574e4d1325b90bb649acba0c734b04f215758dce55756ad6be6de2c6d72d362d0a1fa745bbcbf599eb1e24df4e9ebf533b73a4b761af5ffeea79dbaaba23dc5567bfc548402b2e0f8096872fe3369e8d6fbe02496f6969e1040f75e8b7d1d1ffde94b03fea5f77d53bd91d8e0bf488597179e5b94c9fa9ab2c5ea3ca4a828c6c2a889215156fdfca40ada820db3ade6b1ecc1e5a302c367de315f70991c7d70fa7bcad095cbeffde8af4cbe27496b6e65917476f54698dfdb311136863455ca2b134aed390511b3feec9f50e4e76a226920ce6743c50cfdca41e293b5db41932be6150b699ccd528eeec49496c9dd045a2c0451d84993628c6d5191edc6f1594b9ba5"}, &(0x7f0000001480)=0x1008) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) delete_module(&(0x7f0000000300)='\x00', 0x800) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000340)=0x1, 0x4) listen(r1, 0x4) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) ptrace$setregset(0x4205, r5, 0x7, &(0x7f0000000140)={&(0x7f0000000240)="c90a39ce453855897b89239232204fc0fc5cc8bcc4c5dfbeb005f772181a8fa1540046789f06901cba029a0d623726fa379f2934d135532ab919b9724d988e4d78a8c977f4d0eb242ed3d6d928b2e6ef972d5f9ef9438822b1ab9b3ba2af319e9839aae152396084f48fc05a37bcf79f8accc0351d194af4de51ff59168a8aec715cfc6980372704b30df4614492009a8930446cedb6cbb99f5d35663249", 0x9e}) r6 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r6, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000014c0)=@sack_info={r4, 0x4c7, 0x2}, &(0x7f0000001500)=0xc) 14:55:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x10, 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) bind$inet6(r2, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r2, 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x301080, 0x0) 14:55:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xfff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0xffffffffffffffff}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r2, 0x20400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000200)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x24) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f000029f000/0x2000)=nil, 0x2000, 0xf) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getsig(0x4202, r3, 0x9, &(0x7f00000000c0)) 14:55:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x80005, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r1 = socket$inet6(0xa, 0xb, 0x4000000000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x4e23, 0x5, @remote, 0x68e}, 0x1c) listen(r1, 0x4) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x80c02, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000240)={"fda5362b0805d184397467dbd0add96295830463ff0049379ae155de2301290503e5f25c2620ab3b0cad9df7184ba91075bbd0d63355237957e3ecf7720d2237d2b349e0fa676fb91390e37c46080385394f550545f83f1121a7bcf936a2659576d842a5e6420a718ed9a38f74b393a88a9b8e6067ab5147009c015c2f0be58df35615e960d7abc8c7cf8dc4ef85b0c965f292cb22cf68d22d5d62bf3740e8c68aa15734633e2b9bc2d502231d0ae4f7dad8edac896d5a9b3f0bf6d81c44dc51ba014087ee8605245f7b8505dc9235600186711f0345cc1a778091ca9c32effa9a622c29d0c1d63c50ce1c55398a2d452799ec2a8b0ceccd7f6f6ecbbdfdd57bee024787f8c83026677ef2cbe1db2b0bc9004365f462cf14fc1fb44b48f6de337985bd972e7c9a606fd41d1a725504c758e722f45281840312c5491caac72c81b5cdbd11bda8af4b69fc2c5ca6ff2f34b87fb7d258ac2613623c32c129047d11b44f1da7110b8f3cf70a95bbde3d4e6f21f6b2887df80add4f4096410e8a873293e804529372ca068742ae7ce72b304b5feee37343e3803d820a3bf3eca139ee31f83c92d682b872b199e535ff988e942e3e54fed969efaa71742e567297f5705fb916c73d7918db55c97928ccf332a4f7f27c284d9f482da276b5acfc4117beebcbb0ca7c29718b80f038a99ff0a07dba69b6186212ee71e70ebe3fac6e7d44ad00c388e42e0a0e297b532174317bf685752a4909463938481e8020c90e1084c995b7e0815c0d7e3fdf285f50838453529c72c26bda8dea53e9a385c51b937101781deee50d707e25c7823fc861c6e6a2ec894dc1f6aef73a4afac068fa0e2cd9eeabc0d729315f87ca17036f03661294b8b31da85a42291d4ce9b8bd084251541352d9a92834168bed37af8cb89bfcee64be37a8b6eb21e97439208a096302ffa9cedddbb29c94cd658782fcf026723d86fe818a1694da1a6e921cd8652d056c70e33a40e3db7d841404a30905407f0bee197d728fc019785626a933b28125fa0ddcddfff9670ffc2f3aa431ad0a7cb07d96d299e5fc9ee8e2b070ea88b72b1e129d19578daeb147ea31dc4a9066581c9aad4cf63ec94a1920547065508236f7c5fd19d00e6a98b3cd245cb3ff6f110b3ab4ba254d7784ffd0aac4913f7d1fb57fc642834116deb96f3edc10f261bb0aeea3a9fad1dbf0ee9492403c9edcb5e9ea748115f11d16762c15db9c9305d72d1d549f23a63e2d7f3c155ffa4d36e0975250e19942bbb1fe3b675c0ec2d09a387708a55a2d2c46dbd40ae176b93950caac767ce05802551e15d0df1fb93e1b81b67c268a01c6ffd00026b0867902dac25b2e0f8c1a528be5b02a715926d44ffb1ff960334ac12bbe1a55122e9038d3681040adef3c95485b26d30dd463fde014dd8020c18036e91a382327456a9b3b"}) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r2, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) socket$inet_sctp(0x2, 0x1, 0x84) listen(r2, 0x4) r3 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x80005, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x3f) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x23, "d8419b041957d3aea2284065307b948d7466165553e8b3060a455d995de50575524198"}, &(0x7f0000000200)=0x2b) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x7fffffff, 0x34}, &(0x7f0000000280)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r3 = socket$inet6(0xa, 0x5, 0x1f) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getsockopt$inet6_dccp_int(r3, 0x21, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r3, 0x4) r4 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x3cb, &(0x7f0000000100), 0x10000000000001c8}, 0x0) openat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$inet6(0xa, 0x2, 0x0) 14:55:32 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0xfffffffffffffffb, 0x5, 0x20000000, 0x5]}) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x111, 0x9}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x908}], 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x10) r4 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r4, &(0x7f0000000400)={&(0x7f0000000000)=@l2={0x1f, 0x563, {0xffffffff, 0x1e, 0x9, 0x5, 0x8, 0x7}, 0x80, 0xf8}, 0xffffffffffffffa8, &(0x7f0000000340)=[{&(0x7f00000003c0)='c', 0x1}], 0x0, 0x0, 0xfffffffffffffea7}, 0x4000011) 14:55:32 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) socket$inet_sctp(0x2, 0x801, 0x84) recvmmsg(r0, &(0x7f0000004780)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=""/20, 0x14}, 0xffffffff}, {{&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)=""/44, 0x2c}, {&(0x7f0000000380)=""/223, 0xdf}], 0x2}, 0x40}, {{&(0x7f00000004c0)=@isdn, 0x80, &(0x7f0000002740)=[{&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)=""/6, 0x6}, {&(0x7f0000000600)=""/123, 0x7b}, {&(0x7f0000000680)=""/89, 0x59}, {&(0x7f0000000700)=""/16, 0x10}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/4096, 0x1000}], 0x7}, 0x81}, {{&(0x7f00000027c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002940)=[{&(0x7f0000002840)=""/144, 0x90}, {&(0x7f0000002900)=""/48, 0x30}], 0x2, &(0x7f0000002980)=""/178, 0xb2}}, {{&(0x7f0000002a40)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002ac0)=""/185, 0xb9}, {&(0x7f0000002b80)=""/181, 0xb5}, {&(0x7f0000002c40)=""/246, 0xf6}, {&(0x7f0000002d40)=""/69, 0x45}, {&(0x7f0000002dc0)=""/188, 0xbc}, {&(0x7f0000002e80)=""/48, 0x30}, {&(0x7f0000002ec0)=""/15, 0xf}, {&(0x7f0000002f00)=""/4096, 0x1000}], 0x8, &(0x7f0000003f80)=""/147, 0x93}, 0x51}, {{&(0x7f0000004040)=@x25, 0x80, &(0x7f0000004240)=[{&(0x7f00000040c0)=""/142, 0x8e}, {&(0x7f0000004180)=""/154, 0x9a}], 0x2, &(0x7f0000004280)=""/180, 0xb4}, 0x3}, {{&(0x7f0000004340)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f00000046c0)=[{&(0x7f00000043c0)=""/52, 0x34}, {&(0x7f0000004400)=""/237, 0xed}, {&(0x7f0000004500)=""/133, 0x85}, {&(0x7f00000045c0)=""/114, 0x72}, {&(0x7f0000004640)=""/8, 0x8}, {&(0x7f0000004680)=""/14, 0xe}], 0x6, &(0x7f0000004740)=""/10, 0xa}, 0x2}], 0x7, 0x40, &(0x7f0000004940)={0x77359400}) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000049c0)=@can={0x1d, r2}, 0x80, &(0x7f0000004980), 0x0, 0x0, 0xfffffffffffffdac}, 0x40080) 14:55:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000380)={'filter\x00', 0x4}, 0x68) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x7) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b2c5373b443006f476bffad46dd61ff9c2dd4814f27f83e1b3d14d4e041fa621fcd8f0e134272a7fe4dacb85c04205ff41677431108971daaea96fb37fcc6473f1539fdaf45c4e3927b609c0e3858d41ea52c710ca7a1ae3d37a61bef33d329dd8041fe43a172428caa66748760d93c1b8b21c840d3a78d6ae017e0dea79e9c8e71c0f52a8aca220af19b2502642a01df91fa34ab8328be3", 0x98, 0xfffffffffffffffd) keyctl$read(0xb, r3, &(0x7f0000000340)=""/17, 0x11) 14:55:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r2, 0x20400000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) bind$xdp(r1, &(0x7f0000000700)={0x2c, 0x3, r3, 0x32, r0}, 0x10) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in6=@mcast1, 0x4e22, 0x5, 0x4e22, 0x3a50, 0x0, 0x20, 0x20, 0xba, r3, r4}, {0x15, 0x2, 0xffffffffffffdae8, 0x22, 0x7ff, 0x4, 0x2b6569f7, 0x9}, {0xfffffffffffffffc, 0xc24, 0x6, 0x8}, 0x1, 0x6e6bb9, 0x0, 0x0, 0x3, 0x3}, {{@in6=@local, 0x4d5, 0x7f}, 0xa, @in=@rand_addr=0xfffffffffffffffe, 0x34ff, 0x4, 0x0, 0x1, 0x5, 0x6, 0x4}}, 0xe8) madvise(&(0x7f000029f000/0x2000)=nil, 0x2000, 0xf) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x4, 0xf0, [], 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], &(0x7f0000000140)=""/240}, &(0x7f00000002c0)=0x78) 14:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)=0xffff, 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) write$uinput_user_dev(r1, &(0x7f0000000240)={'syz0\x00', {0x3, 0xfffffffffffffffd, 0xf80, 0xfffffffff674d3bc}, 0x2, [0x7f, 0x2, 0x0, 0x3, 0x7, 0x7, 0x7ff, 0x2, 0x6, 0x8, 0x100, 0xffffffffffff9119, 0x94, 0x1e, 0xef7, 0x7b60000000000, 0xfffffffffffffff7, 0x7, 0x2, 0x7, 0xfffffffffffffffd, 0x81, 0xfffffffffffffffa, 0xa62, 0x1, 0x0, 0x7, 0x2, 0xf825, 0xf8ed, 0xffffffffffff295d, 0x7, 0xfff, 0x9, 0x7, 0x3238, 0x81, 0x2, 0xff, 0x7f, 0x7, 0x5, 0x1000, 0x9, 0xa3f, 0x3, 0x61, 0xe60, 0x4, 0x40, 0x100000000, 0x3, 0x42fd, 0x6, 0x5, 0x4e9, 0x0, 0x8, 0x0, 0x5, 0x388, 0xeb77, 0x100000001, 0x6], [0x93, 0x0, 0x100000000, 0xd86, 0x401, 0x0, 0x7, 0x2, 0x80000000, 0xa1a, 0x6, 0x10000, 0x3, 0x9, 0xffff, 0x3, 0x1, 0x10000, 0x7, 0x7, 0x7fff, 0x3, 0x1, 0xffffffff, 0xfffffffffffffff9, 0xfff, 0xd04, 0x3, 0x377c, 0x5, 0x8, 0x100, 0x3, 0x8, 0x8, 0x7, 0x1, 0x1, 0x5, 0xc7, 0xbd5f, 0x6, 0x2, 0x0, 0x9, 0x7ff, 0x8, 0x1, 0x7, 0xfffffffffffffff8, 0x80, 0x54d8, 0x0, 0x9bb, 0x0, 0x4, 0x401, 0x8, 0x1, 0x7, 0x8000, 0x4, 0x4, 0x10000], [0xffff, 0x1, 0xe861, 0x6, 0x3cd, 0xdb, 0x4, 0x6, 0x80000000, 0x20, 0xfffffffffffeffff, 0x5, 0x45bd, 0x6, 0x3, 0x9, 0x3ff, 0x100000001, 0x8, 0x2, 0x0, 0x3f, 0x6, 0x5, 0x1, 0x7, 0x0, 0x2, 0x9, 0x7, 0x0, 0x0, 0x100, 0x9, 0xfffffffffffffff9, 0xfc40, 0x0, 0x5, 0x100000001, 0x1000, 0x0, 0x3d, 0xfffffffffffffff9, 0xfffffffffffffffc, 0xfdcb, 0xe6f, 0x81, 0x1721, 0x4c07d4a4, 0x0, 0x1, 0x7, 0x1, 0x7, 0x8, 0x400, 0xd4, 0xffffffffffffffe1, 0xe7, 0x100000000, 0x9, 0x7, 0x1, 0x7], [0x100000000, 0xcb75, 0x8, 0x4, 0x0, 0x5, 0x3b, 0x2, 0x5, 0x9, 0x100000000, 0x60, 0x1ff, 0xed7, 0x1, 0x0, 0x3, 0x20, 0x7, 0x400, 0x2, 0x80, 0x3, 0xffff, 0x1, 0x4, 0x168, 0x4, 0x40, 0x8, 0x3, 0x7fffffff, 0x4, 0x101, 0x9, 0x4, 0x6, 0x3, 0x80, 0x3aa2, 0x9, 0xa4a, 0xe0cd, 0x1ff, 0x8, 0x7, 0x3, 0x100000000, 0x8, 0x3f, 0x8000, 0x1ff, 0x20, 0x7b66, 0x8000, 0x8, 0x2, 0x7357, 0x7f, 0xcb1, 0x1, 0x6, 0x3, 0x6]}, 0x45c) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x2, 0x2, 0x8}}, 0x14) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) r3 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x3, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xd382}, @generic={0x20, 0xfffffffffffff1ca, 0x8, 0xfffffffffffffffd, 0x4}], &(0x7f0000000140)='syzkaller\x00', 0x9, 0x66, &(0x7f0000000240)=""/102, 0x41100, 0x1, [], r2, 0x3, r3, 0x8, &(0x7f0000000380)={0xfffffffffffff001, 0x10001}, 0x8, 0x10, &(0x7f00000003c0)={0x7, 0x80, 0xfff, 0x7}, 0x10}, 0x70) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) socket$inet6(0xa, 0x80000, 0x2) r4 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x5, 0x80000001, 0x1}) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:35 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r3) 14:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:36 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') mbind(&(0x7f000029f000/0x1000)=nil, 0x1000, 0x4002, &(0x7f0000000080)=0x3f, 0xff, 0x4) openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x400}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r2, 0x1000, 0x9, 0x80, 0x10000, 0x101}, &(0x7f00000002c0)=0x14) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x7) r4 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r4, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') write$capi20(r1, &(0x7f0000000000)={0x10, 0x7fff, 0x4, 0x83, 0x2, 0x4e1}, 0x10) lseek(r1, 0x20400000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) r2 = msgget(0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r3}) msgctl$MSG_STAT(r2, 0xb, &(0x7f00000000c0)) madvise(&(0x7f000029f000/0x2000)=nil, 0x2000, 0xf) 14:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:37 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x0, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x401, {{0xa, 0x4e20, 0x46, @mcast1, 0x7}}, 0x1, 0x4, [{{0xa, 0x4e21, 0x4, @ipv4={[], [], @empty}, 0x7ff}}, {{0xa, 0x4e21, 0x5, @remote, 0x5}}, {{0xa, 0x4e24, 0x10000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, {{0xa, 0x4e20, 0x401, @ipv4={[], [], @multicast2}, 0xf085}}]}, 0x290) 14:55:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xad\xfc*mc\xb2', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xffffffffffffff0a}, 0x2000008f) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x3000000000, 0x4, 0x4, 0x7, 0x8, 0x5}) madvise(&(0x7f000029f000/0x2000)=nil, 0x2000, 0xf) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) 14:55:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:38 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x0, 0x84) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x1f) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) 14:55:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x0, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x0, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) r3 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000240)="0de63bf05150910c6163668d5e54a385ab", 0x11, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="e3b188d00e81752ea4ee0f83a376658d6e5d633eff7f60798ab35f5ded4728a252ae6b", 0x23, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000280)='rxrpc\x00', &(0x7f0000000380)=@keyring={'key_or_keyring:', r4}) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:38 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='setgroups\x00') lseek(r2, 0x20400000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f000029f000/0x2000)=nil, 0x2000, 0xf) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x65b6aafe, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000040)={r3, 0x1}) 14:55:39 executing program 4: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:39 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x0, 0x80005, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:39 executing program 4: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:39 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x10001, 0x2, 0x6}, &(0x7f0000002940)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000002980)={0x0, 0x40, 0x2, [0x0, 0x1000]}, &(0x7f00000029c0)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000002a00)=@assoc_value={0x0, 0x7}, &(0x7f0000002a40)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000002e40)={0x0}, &(0x7f0000002e80)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000002ec0)={0x0, 0x1, 0x9, 0x9, 0x8, 0x9}, &(0x7f0000002f00)=0x14) sendmmsg$inet_sctp(r0, &(0x7f0000003140)=[{&(0x7f0000000180)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000002840)=[{&(0x7f00000001c0)="bbd74d76d046f575fcaa0f805ec9546e4006b83404539d8eed88120f6aeb278b1332dac0b69e9b330d39408f7a3f78e198e5770a166f87ebf80ba2932977363f0d", 0x41}, {&(0x7f0000000240)="c7a179bfb211067b17095d966453eb86c3ea8204a2f999180e38d37ffcefb07457e54916d8d25cf75e64facd5a97c677f3b2575e005d5aa9a4e284bccbc45dbe07419fff2bed21ce75fc52db6a1a711b164bd16fe5a784d552937ed8c9ffae46470d974268c8154b39faad2e55261a06", 0x70}, {&(0x7f00000002c0)="726c36e23f8a61a7848a7995220f10f30211b16e417b0d0a0e94004f2f7e545e9862346a180e2af9f56ef2c4df661a269d41dc837a8ce644f0d289f863d48575c33afb60342b9e73a92a65a6b4759aad156b25ec8c5220f2650352e3f454492ad7591db98a45c8cb8f3648ff0690921f22409460f90647fda8f7efd2f5edc0e1ad9df3e30769fec217bf7bea569fe7990b3d94405b0252f71468cce0ce9186b8d781a81373913a81399e9827b00d", 0xae}, {&(0x7f0000000640)="fac22a056740c2903fa52d03f5206147163510fc9b4236013a3b0565f905f9497b256e2fc9972eedef91ed1c448217bb4ea3534c0395a424abfba9461b8261754435b075ed1f45909e20b2fc910e6d6204b8ce48518f1cd7972f76c3d1bc9d836efc2a445fcad61446a198e0f45b10bbc9cc3b579606b463255588b22aae5f436ca7feb2232d4eb4dff94ad11b0a13ad7cd4", 0x92}, {&(0x7f0000000380)="8fce0758e1785c934265cc2c1911e400aa15b36432d0252801432354f6b68fd1dc4b20871ff7293ba9d31a72", 0x2c}, {&(0x7f0000000700)="972a0bc93cc70fabf8aa616f9b158db70daa70f83dbd7f9e9bbef9725691bd448fd73ff37b97a6e71af439f6459decda9ff094b2ecb542b01586fbb4819129723ce5a9c24056cc2b03aa8e191a0dd195", 0x50}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000002780)="3da436d9691fc66d16698bf5b68b141eff879c95786998eff23682927e00a84c7e5bece021d1e949e9bd0710313ac894d8e63234191e5ed798fe51bf35795f885768c852baa88520357b47353b51f03265194bd68b728dcdf49d97df23f635ebcec256eddc5f841e9bb1ce271c2c1f588db331835e8b4e5c7a8dc2d4244fc7f2b436487d2bcdc98b3fda5b6d53ad", 0x8e}, {&(0x7f0000000440)}], 0xa, &(0x7f0000002a80)=[@sndrcv={0x30, 0x84, 0x1, {0x8, 0x3f, 0x3, 0x7, 0x9, 0x4, 0x2c, 0x87a, r3}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x9, 0xf9d, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0xa3350b43dad9adf5, 0x20, 0x6, r5}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}], 0x88, 0x4000}, {&(0x7f0000002b40)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, &(0x7f0000002e00)=[{&(0x7f0000002b80)="fd63235c07c13dcbdef098dd0421b6bd7249037303729547a032e919df406b622a491d69a99c52a488dff98106e38ed01894b9f86aaa238a0b2c0de863be5989f89bb8063f1fa52d2c853d58e4b634f5b23b41f058ac801724839901712587e13f13c2ad29d1c66557ef075e718cfbe765fb99ab8ec2c9657679209033d3b85c6771da9a90e1ad9f26749dd1fd15cafd5ecf3bd3ecea5749a2ff52514af727ca1c5c8a0466eeff54b6bf56994fd48420957035e5b3b498a3acd1a263", 0xbc}, {&(0x7f0000002c40)="758279c3d3efef19ae3089d6f5dfdbba87839de0bc92f72aa4ae08f39367a9b0e147107bfb5746e50da6b3242e3b6463255c5c885a255b410470789d64adf4f7135f224d1afabc4f2fa099fa69f1e353fd5bbc89b199acf71634fdb705f46dacac74fe5e22738a0f2bbf0acad90b16c2fde12af169e8048833c65ac9426bc3ea9e02525d4ed151dc57a3298be481611019bf71fb405ea8e7f7e7d50a5d8e60fe6a31042c745571f756a3971067f60ebc67053648ad7ceb27b342b7", 0xbb}, {&(0x7f0000002d00)="225b2203911af13941f44cc301c77c0ac1968c80b639cd4ec7292acbf43e2911d77137500bd5463f8012823071f1f7939f3d514ddfa23d6c814f2d61575b1eb2c4d6b53846a75f8bb2571329667ca03e0d8c0818a9637c81c2de7042f334796a77a9b1a4f7d09b511738a488973524dc8bfa658fb5c8c5fc68794a8ca5d997d879c18c308ebc81e68921d1176cd297513e4141c8ab77fdf28c65715e81b31136ca7db58abe91f862dd7369f1f7cbc0805f0f10678f85f3e1cec55ae676bc1e0308dfd016c5ab9d476968432de96b7e67690860912efe320e3df5712848cc42fc721e0e7ce2ce03029b73c5e880b20e7e451e70b335772fe7eb", 0xf9}], 0x3, &(0x7f0000002f40)=[@dstaddrv6={0x20, 0x84, 0x8, @rand_addr="71e6b123a0f249ce90b0933b397a0988"}, @sndinfo={0x20, 0x84, 0x2, {0xffffffffffffff14, 0x2, 0x8, 0x7fff, r6}}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x9, 0x1, 0x7, r7}}], 0x60, 0x4045}, {&(0x7f0000002fc0)=@in={0x2, 0x4e23, @rand_addr=0x5}, 0x10, &(0x7f0000003100)=[{&(0x7f0000003000)="c219ba2fb3fcbd300ae33e296b5c9957fc66746f357e", 0x16}, {&(0x7f0000003040)="bad011880db4c4ba8b7f66ec0b3a95fa347692ecf05201526b7a24ef8d812272e58b336a30415621e38adc39c7dc6b0e0ba5f782662d3c2c9f1fd0f8896ed8bbcb4d18735e7c6782df48f9ef5d6d950b23b2bd26506f7acb059467b0f9b1a8c29f85a67c2bf2926f1158eabaf71679a25467bc066a5f5310a38d88f6d202560a5d7da43ef427f5c5140b5bd678b46f2804b56b8d4b7d0a0023791b20d3ebdc2bb965", 0xa2}], 0x2, 0x0, 0x0, 0x4000810}], 0x3, 0x4000000) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) 14:55:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:39 executing program 4: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:40 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, 0x0, 0x0) 14:55:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x14, "7b00ef178e035d75af874b9be97b35cfd0ae1dda"}, &(0x7f0000000340)=0x1c) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r2, &(0x7f00000003c0)=0x4) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x40000) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000040)=0x9e64000000000, 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r3, 0x4) r5 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r5, &(0x7f0000000080)={&(0x7f0000000100)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x19b}, 0x0) 14:55:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) rmdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:41 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 14:55:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x80005, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 14:55:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0xffffffffffffffff, 0x84) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) sendmsg(r2, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) ioctl$int_out(r2, 0x2, &(0x7f0000000100)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x200001) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/180) 14:55:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xb7) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'security.', 'fd'}, &(0x7f0000000440)=""/144, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 14:55:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 932.081841] RSP: 002b:00007f2fabaacc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 932.081841] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 932.081841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 932.081841] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 932.081841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fabaad6d4 [ 932.081841] R13: 00000000004bee2f R14: 00000000004cfc60 R15: 00000000ffffffff [ 932.081841] [ 932.081841] Local variable description: ----address@__sys_bind [ 932.081841] Variable was created at: [ 932.081841] __sys_bind+0x87/0x7c0 [ 932.081841] __se_sys_bind+0x8d/0xb0 [ 932.081841] ================================================================== [ 932.081841] Disabling lock debugging due to kernel taint [ 932.081841] Kernel panic - not syncing: panic_on_warn set ... [ 932.081841] CPU: 0 PID: 29618 Comm: syz-executor.2 Tainted: G B 5.1.0-rc4+ #2 [ 932.081841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.081841] Call Trace: [ 932.081841] dump_stack+0x173/0x1d0 [ 932.081841] panic+0x3d1/0xb01 [ 932.081841] kmsan_report+0x29a/0x2a0 [ 932.081841] __msan_warning+0x7a/0xf0 [ 932.081841] rds_bind+0x1ad/0x2520 [ 932.081841] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 932.081841] ? aa_sk_perm+0x741/0xb00 [ 932.081841] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 932.081841] ? apparmor_socket_bind+0x12b/0x2d0 [ 932.081841] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 932.081841] ? rds_remove_bound+0x890/0x890 [ 932.081841] __sys_bind+0x60b/0x7c0 [ 932.081841] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 932.081841] ? prepare_exit_to_usermode+0x114/0x420 [ 932.081841] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 932.081841] ? syscall_return_slowpath+0x50/0x650 [ 932.081841] __se_sys_bind+0x8d/0xb0 [ 932.081841] __x64_sys_bind+0x4a/0x70 [ 932.081841] do_syscall_64+0xbc/0xf0 [ 932.081841] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 932.081841] RIP: 0033:0x458da9 [ 932.081841] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 932.081841] RSP: 002b:00007f2fabaacc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 932.081841] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 932.081841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 932.081841] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 932.081841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fabaad6d4 [ 932.081841] R13: 00000000004bee2f R14: 00000000004cfc60 R15: 00000000ffffffff [ 932.081841] Kernel Offset: disabled [ 932.081841] Rebooting in 86400 seconds..