}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:16 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:16 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{0x0, 0x0, 0x0, 0x0, 0xa, 0x1, 0x13, 0x9}, "a6cdfbf784234830923491ce481e0b18d9c212b8ca6baa23fb30f953505e0e0ac21a03ca5f023919356a6144001092806431f8d4e52c66835a54b6ad5af06b736f9acb8f477f49e22cb3ed7a12e59aa1893931", [[], [], [], [], [], [], [], [], [], []]}, 0xa73) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:16 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:16 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:16 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:16 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:17 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x13, 0x9}, "a6cdfbf784234830923491ce481e0b18d9c212b8ca6baa23fb30f953505e0e0ac21a03ca5f023919356a6144001092806431f8d4e52c66835a54b6ad5af06b736f9acb8f477f49e22cb3ed7a12e59aa1893931", [[], [], [], [], [], [], [], [], [], []]}, 0xa73) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:17 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:17 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) [ 1222.754528] audit: type=1326 audit(1537379597.766:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4777 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:18 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:18 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x9}, "a6cdfbf784234830923491ce481e0b18d9c212b8ca6baa23fb30f953505e0e0ac21a03ca5f023919356a6144001092806431f8d4e52c66835a54b6ad5af06b736f9acb8f477f49e22cb3ed7a12e59aa1893931", [[], [], [], [], [], [], [], [], [], []]}, 0xa73) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:18 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}], 0xd8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:18 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:18 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1223.812570] audit: type=1326 audit(1537379598.816:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:19 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, "a6cdfbf784234830923491ce481e0b18d9c212b8ca6baa23fb30f953505e0e0ac21a03ca5f023919356a6144001092806431f8d4e52c66835a54b6ad5af06b736f9acb8f477f49e22cb3ed7a12e59aa1893931", [[], [], [], [], [], [], [], [], [], []]}, 0xa73) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:19 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}], 0xbc) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:19 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:19 executing program 5: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:19 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1224.774102] audit: type=1326 audit(1537379599.785:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4831 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:20 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:20 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "a6cdfbf784234830923491ce481e0b18d9c212b8ca6baa23fb30f953505e0e0ac21a03ca5f023919356a6144001092806431f8d4e52c66835a54b6ad5af06b736f9acb8f477f49e22cb3ed7a12e59aa1893931", [[], [], [], [], [], [], [], [], [], []]}, 0xa73) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:20 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}], 0xa0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:20 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:20 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:20 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:21 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], [], [], [], [], [], [], []]}, 0xa20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:21 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}], 0x90) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:21 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:21 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:21 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:21 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:22 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], [], [], [], [], [], []]}, 0x920) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:22 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x74) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:22 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:22 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:22 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:23 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}], 0x64) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:23 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], [], [], [], [], []]}, 0x820) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:23 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:23 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:23 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:24 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], [], [], [], []]}, 0x720) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:24 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}], 0x48) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:24 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:24 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:24 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:25 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:25 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], [], [], []]}, 0x620) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:25 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}], 0x2c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:25 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:25 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:25 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:26 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:26 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], [], []]}, 0x520) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:26 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}], 0x1c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:26 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:26 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:26 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:27 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:27 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], [], []]}, 0x420) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:27 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:27 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:27 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:27 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:27 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:28 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], [], []]}, 0x320) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:28 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:28 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:28 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:29 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[], []]}, 0x220) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:29 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:29 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}], 0xd8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:29 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:29 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:29 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:30 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)={{}, "", [[]]}, 0x120) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:30 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:30 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}], 0xbc) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:30 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:30 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:30 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:30 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:31 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:31 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:31 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') socket$inet6(0xa, 0x0, 0x80000000) chdir(&(0x7f0000000080)='./file0\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0), 0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880), 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000007c0), &(0x7f0000000800)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), 0xc) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000840), 0x4) 17:53:31 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:31 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}], 0xa0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:31 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:31 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:32 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:32 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:32 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:32 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}], 0x90) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:32 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:32 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:32 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:32 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:33 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:33 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x74) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:33 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:33 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1238.580429] audit: type=1326 audit(1537379613.592:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5137 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:33 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:33 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:34 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:34 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:34 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}], 0x64) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1239.545255] audit: type=1326 audit(1537379614.553:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5156 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:34 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:34 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:35 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:35 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(r0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:35 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:35 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}], 0x48) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1240.505816] audit: type=1326 audit(1537379615.517:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5174 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:35 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:35 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:35 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) 17:53:35 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:35 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(0x0, &(0x7f0000000b80)='ns/cgroup\x00') 17:53:36 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}], 0x2c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:37 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:37 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}], 0x1c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:37 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:37 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:38 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:38 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:38 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:38 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:39 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:39 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x40) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:39 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:39 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}], 0xd8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:39 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:40 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:53:40 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:40 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:40 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:53:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}], 0xbc) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:40 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:40 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:40 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:53:41 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}], 0xa0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:41 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}], 0x90) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:42 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x74) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:43 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:44 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:44 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}], 0x64) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:44 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:44 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:45 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:45 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:45 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1250.101296] audit: type=1326 audit(1537379625.112:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5396 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:45 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}], 0x48) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:45 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:46 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:46 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:46 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1251.195978] audit: type=1326 audit(1537379626.207:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5413 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}], 0x2c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:46 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:47 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:47 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1252.166216] audit: type=1326 audit(1537379627.177:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5432 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:47 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:47 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}], 0x1c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:47 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:48 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:48 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}], 0xd8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:48 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:48 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:48 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:48 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:49 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:49 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}], 0xbc) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:49 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:49 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}], 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:49 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x40) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:49 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}], 0xa0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}, @in6={0xa, 0x4e22, 0x1}], 0xd8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:50 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:53:51 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}], 0x90) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:53:51 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x9116}], 0xbc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:53:51 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:51 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x74) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}, @in={0x2, 0x4e22, @loopback}], 0xa0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}], 0x64) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x939, @dev={0xfe, 0x80, [], 0x19}, 0x101}], 0x90) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:53 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:54 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}], 0x48) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:54 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:54 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x74) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:54 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:54 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:54 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1259.601845] audit: type=1326 audit(1537379634.613:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5604 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}], 0x2c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:55 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:55 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x7}], 0x64) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:55 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:55 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1260.532316] audit: type=1326 audit(1537379635.543:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5621 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:55 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}], 0x1c) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:56 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:56 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x6}, 0x1}], 0x48) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1261.480196] audit: type=1326 audit(1537379636.491:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5639 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:53:56 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:56 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:56 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x800, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:57 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:57 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}, @in={0x2, 0x4e21, @multicast1}], 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:57 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:57 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:57 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:57 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0)=[@in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x3}], 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:53:59 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 4: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:00 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 4: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:01 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1266.549355] audit: type=1326 audit(1537379641.561:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5790 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:01 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1266.839115] khugepaged: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1266.849399] khugepaged cpuset=/ mems_allowed=0 [ 1266.854015] CPU: 0 PID: 721 Comm: khugepaged Not tainted 4.19.0-rc4+ #50 [ 1266.860857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1266.870212] Call Trace: [ 1266.872829] dump_stack+0x14b/0x190 [ 1266.876477] warn_alloc+0x472/0x690 [ 1266.880156] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1266.885039] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1266.890616] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1266.896385] ? kmsan_set_origin_inline+0x6b/0x120 [ 1266.901238] ? __msan_poison_alloca+0x173/0x1f0 [ 1266.905926] ? compaction_defer_reset+0x5e/0x390 [ 1266.910694] ? __alloc_pages_direct_compact+0x3bd/0x4e0 [ 1266.916066] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1266.921433] ? compaction_defer_reset+0x30e/0x390 [ 1266.926302] ? __alloc_pages_direct_compact+0x3bd/0x4e0 [ 1266.931680] kmsan_alloc_page+0x75/0xd0 [ 1266.935673] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1266.940484] ? apic_timer_interrupt+0xa/0x20 [ 1266.944940] khugepaged_scan_mm_slot+0x29f5/0xeba0 [ 1266.949939] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1266.955411] ? pick_next_task_fair+0x22a8/0x24c0 [ 1266.960223] ? __msan_poison_alloca+0x173/0x1f0 [ 1266.964923] ? __switch_to+0x2b3/0x420 [ 1266.968823] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 1266.974648] ? rcu_all_qs+0x2e/0x1f0 [ 1266.978407] khugepaged+0x82c/0x1790 [ 1266.982133] ? init_wait_entry+0x190/0x190 [ 1266.986402] kthread+0x465/0x4a0 17:54:02 executing program 4: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1266.989785] ? start_stop_khugepaged+0x790/0x790 [ 1266.994552] ? kthread_blkcg+0xf0/0xf0 [ 1266.998447] ret_from_fork+0x35/0x40 [ 1267.002169] Mem-Info: [ 1267.004625] active_anon:284460 inactive_anon:106 isolated_anon:20 [ 1267.004625] active_file:1565 inactive_file:3742 isolated_file:0 [ 1267.004625] unevictable:0 dirty:38 writeback:0 unstable:0 [ 1267.004625] slab_reclaimable:3337 slab_unreclaimable:9119 [ 1267.004625] mapped:53152 shmem:116 pagetables:1315 bounce:0 [ 1267.004625] free:85170 free_pcp:1058 free_cma:0 [ 1267.038117] Node 0 active_anon:1137840kB inactive_anon:424kB active_file:6260kB inactive_file:14968kB unevictable:0kB isolated(anon):80kB isolated(file):0kB mapped:212608kB dirty:152kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1267.066223] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1267.092401] lowmem_reserve[]: 0 2833 7259 7259 [ 1267.097035] Node 0 DMA32 free:272688kB min:26324kB low:32904kB high:39484kB active_anon:596380kB inactive_anon:12kB active_file:108kB inactive_file:3720kB unevictable:0kB writepending:60kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1856kB pagetables:2360kB bounce:0kB free_pcp:1804kB local_pcp:1460kB free_cma:0kB [ 1267.126394] lowmem_reserve[]: 0 0 4425 4425 [ 1267.130742] Node 0 Normal free:50404kB min:41112kB low:51388kB high:61664kB active_anon:541608kB inactive_anon:412kB active_file:6152kB inactive_file:11248kB unevictable:0kB writepending:92kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7872kB pagetables:3196kB bounce:0kB free_pcp:1364kB local_pcp:16kB free_cma:0kB [ 1267.160188] lowmem_reserve[]: 0 0 0 0 [ 1267.164028] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1267.177396] Node 0 DMA32: 5070*4kB (ME) 6560*8kB (UM) 5320*16kB (UM) 1827*32kB (UME) 369*64kB (UME) 50*128kB (UME) 23*256kB (UM) 14*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 272728kB [ 1267.194464] Node 0 Normal: 1623*4kB (UME) 2629*8kB (UME) 692*16kB (UME) 197*32kB (UME) 26*64kB (UM) 12*128kB (M) 5*256kB (M) 0*512kB 1*1024kB (M) 0*2048kB 0*4096kB = 50404kB [ 1267.210239] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1267.218803] 5423 total pagecache pages [ 1267.222681] 0 pages in swap cache [ 1267.226126] Swap cache stats: add 0, delete 0, find 0/0 [ 1267.231472] Free swap = 0kB [ 1267.234475] Total swap = 0kB [ 1267.237482] 1965979 pages RAM [ 1267.240579] 0 pages HighMem/MovableOnly [ 1267.244554] 102442 pages reserved [ 1267.258124] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1267.268634] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1267.273767] CPU: 1 PID: 5802 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1267.280954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.290313] Call Trace: [ 1267.292931] dump_stack+0x14b/0x190 [ 1267.296623] warn_alloc+0x472/0x690 [ 1267.300303] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1267.305192] ? kernel_poison_pages+0x1a0/0x360 [ 1267.309800] ? update_load_avg+0x6c4/0x1a00 [ 1267.314198] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1267.319949] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1267.325468] kmsan_alloc_page+0x75/0xd0 [ 1267.329463] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1267.334241] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.339105] ? should_fail+0x53/0xaa0 [ 1267.342921] ? __should_failslab+0x278/0x2a0 [ 1267.347410] alloc_pages_vma+0x1578/0x1830 [ 1267.351731] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1267.356868] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.361752] handle_mm_fault+0x4377/0x81b0 [ 1267.366009] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.370898] __do_page_fault+0xc8b/0x17e0 [ 1267.375078] do_page_fault+0x98/0xd0 [ 1267.378804] ? page_fault+0x8/0x30 [ 1267.382369] page_fault+0x1e/0x30 [ 1267.385849] RIP: 0033:0x40052d [ 1267.389051] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1267.407971] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1267.413358] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1267.420647] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1267.427923] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 17:54:02 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1267.435195] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000b [ 1267.442474] R13: 0000000000135351 R14: 0000000000000658 R15: badc0ffeebadface 17:54:02 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1267.519062] audit: type=1326 audit(1537379642.530:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5810 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:02 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1267.742766] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1267.753302] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1267.758459] CPU: 0 PID: 5824 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1267.765653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1267.775032] Call Trace: [ 1267.777635] dump_stack+0x14b/0x190 [ 1267.781289] warn_alloc+0x472/0x690 [ 1267.784972] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1267.789864] ? kernel_poison_pages+0x1a0/0x360 [ 1267.794530] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1267.800274] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1267.805777] kmsan_alloc_page+0x75/0xd0 [ 1267.809766] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1267.814539] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.819410] ? __msan_poison_alloca+0x173/0x1f0 [ 1267.824094] ? should_fail+0x53/0xaa0 [ 1267.827912] ? __should_failslab+0x278/0x2a0 [ 1267.832331] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.837221] alloc_pages_vma+0x1578/0x1830 [ 1267.841485] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1267.846597] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.851470] handle_mm_fault+0x4377/0x81b0 [ 1267.855712] ? kmsan_set_origin_inline+0x6b/0x120 [ 1267.860601] __do_page_fault+0xc8b/0x17e0 [ 1267.864785] do_page_fault+0x98/0xd0 [ 1267.868511] ? page_fault+0x8/0x30 [ 1267.872070] page_fault+0x1e/0x30 [ 1267.875529] RIP: 0033:0x40052d 17:54:02 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:02 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1267.878732] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1267.897637] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1267.903020] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1267.910294] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1267.917571] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1267.924843] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000b [ 1267.932116] R13: 0000000000135560 R14: 0000000000000659 R15: badc0ffeebadface [ 1268.010524] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1268.021036] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1268.026184] CPU: 0 PID: 5831 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1268.033394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.042761] Call Trace: [ 1268.045370] dump_stack+0x14b/0x190 [ 1268.049044] warn_alloc+0x472/0x690 [ 1268.052727] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1268.057594] ? kernel_poison_pages+0x1a0/0x360 [ 1268.062250] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1268.067991] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1268.073527] kmsan_alloc_page+0x75/0xd0 [ 1268.077519] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1268.082299] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.087155] ? __msan_poison_alloca+0x173/0x1f0 [ 1268.091842] ? should_fail+0x53/0xaa0 [ 1268.095668] ? __should_failslab+0x278/0x2a0 [ 1268.100090] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.104986] alloc_pages_vma+0x1578/0x1830 [ 1268.109260] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1268.114394] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.119272] handle_mm_fault+0x4377/0x81b0 [ 1268.123530] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.128442] __do_page_fault+0xc8b/0x17e0 [ 1268.132634] do_page_fault+0x98/0xd0 [ 1268.136361] ? page_fault+0x8/0x30 [ 1268.139923] page_fault+0x1e/0x30 [ 1268.143390] RIP: 0033:0x40052d [ 1268.146589] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1268.165490] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1268.170860] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1268.178138] RDX: 000000000000000c RSI: 0000000000000000 RDI: 000000000259d848 [ 1268.185418] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1268.192691] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000a [ 1268.199957] R13: 000000000013579c R14: 0000000000000558 R15: badc0ffeebadface [ 1268.207241] warn_alloc_show_mem: 2 callbacks suppressed [ 1268.207246] Mem-Info: [ 1268.215032] active_anon:284506 inactive_anon:107 isolated_anon:0 [ 1268.215032] active_file:2035 inactive_file:2255 isolated_file:0 [ 1268.215032] unevictable:0 dirty:39 writeback:0 unstable:0 [ 1268.215032] slab_reclaimable:3339 slab_unreclaimable:9119 [ 1268.215032] mapped:52619 shmem:116 pagetables:1415 bounce:0 [ 1268.215032] free:84950 free_pcp:918 free_cma:0 [ 1268.248320] Node 0 active_anon:1138024kB inactive_anon:428kB active_file:8140kB inactive_file:9020kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:210476kB dirty:156kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1268.276270] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1268.302429] lowmem_reserve[]: 0 2833 7259 7259 [ 1268.307045] Node 0 DMA32 free:272512kB min:26324kB low:32904kB high:39484kB active_anon:595952kB inactive_anon:8kB active_file:120kB inactive_file:3300kB unevictable:0kB writepending:60kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1600kB pagetables:2056kB bounce:0kB free_pcp:1160kB local_pcp:1048kB free_cma:0kB [ 1268.336318] lowmem_reserve[]: 0 0 4425 4425 [ 1268.340682] Node 0 Normal free:51384kB min:41112kB low:51388kB high:61664kB active_anon:541956kB inactive_anon:420kB active_file:8020kB inactive_file:5720kB unevictable:0kB writepending:96kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8256kB pagetables:3604kB bounce:0kB free_pcp:2512kB local_pcp:1300kB free_cma:0kB [ 1268.370208] lowmem_reserve[]: 0 0 0 0 [ 1268.374054] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1268.387408] Node 0 DMA32: 5197*4kB (UME) 6562*8kB (UM) 5312*16kB (UM) 1824*32kB (UME) 376*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 272068kB 17:54:03 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1268.404502] Node 0 Normal: 2097*4kB (ME) 2617*8kB (UME) 691*16kB (UME) 152*32kB (ME) 21*64kB (UM) 13*128kB (UM) 6*256kB (M) 1*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 51324kB [ 1268.420554] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1268.429122] 4406 total pagecache pages [ 1268.433002] 0 pages in swap cache [ 1268.436454] Swap cache stats: add 0, delete 0, find 0/0 [ 1268.441816] Free swap = 0kB [ 1268.444836] Total swap = 0kB [ 1268.447877] 1965979 pages RAM [ 1268.450983] 0 pages HighMem/MovableOnly [ 1268.454953] 102442 pages reserved [ 1268.542788] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1268.553316] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1268.558489] CPU: 1 PID: 5836 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1268.565780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.575169] Call Trace: [ 1268.577806] dump_stack+0x14b/0x190 [ 1268.581480] warn_alloc+0x472/0x690 [ 1268.585186] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1268.590078] ? kernel_poison_pages+0x1a0/0x360 [ 1268.594934] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1268.600687] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1268.606214] kmsan_alloc_page+0x75/0xd0 [ 1268.610220] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1268.615008] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.619883] ? __msan_poison_alloca+0x173/0x1f0 [ 1268.624581] ? should_fail+0x53/0xaa0 [ 1268.628420] ? __should_failslab+0x278/0x2a0 [ 1268.633366] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.638304] alloc_pages_vma+0x1578/0x1830 [ 1268.642583] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1268.647716] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.652606] handle_mm_fault+0x4377/0x81b0 [ 1268.656865] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.661772] __do_page_fault+0xc8b/0x17e0 [ 1268.665976] do_page_fault+0x98/0xd0 [ 1268.669722] ? page_fault+0x8/0x30 [ 1268.673283] page_fault+0x1e/0x30 [ 1268.676757] RIP: 0033:0x43e6c1 17:54:03 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1268.679987] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1268.698926] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1268.704342] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1268.711657] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1268.718943] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1268.726236] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1268.733520] R13: 00000000009300ac R14: 0000000000135b77 R15: 0000000000135b4a 17:54:03 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1268.802335] syz-executor3: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1268.812954] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1268.818118] CPU: 1 PID: 5841 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #50 [ 1268.825332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1268.834742] Call Trace: [ 1268.837362] dump_stack+0x14b/0x190 [ 1268.841064] warn_alloc+0x472/0x690 [ 1268.844759] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1268.849647] ? kernel_poison_pages+0x1a0/0x360 [ 1268.854324] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1268.860097] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1268.865631] kmsan_alloc_page+0x75/0xd0 [ 1268.869650] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1268.874463] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.879341] ? __msan_poison_alloca+0x173/0x1f0 [ 1268.884074] ? should_fail+0x53/0xaa0 [ 1268.887902] ? __should_failslab+0x278/0x2a0 [ 1268.892348] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.897292] alloc_pages_vma+0x1578/0x1830 [ 1268.901584] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1268.906732] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.911638] handle_mm_fault+0x4377/0x81b0 [ 1268.915907] ? kmsan_set_origin_inline+0x6b/0x120 [ 1268.920818] __do_page_fault+0xc8b/0x17e0 [ 1268.925051] do_page_fault+0x98/0xd0 [ 1268.928802] ? page_fault+0x8/0x30 [ 1268.932371] page_fault+0x1e/0x30 [ 1268.935879] RIP: 0033:0x40052d 17:54:04 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1268.939099] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1268.958029] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1268.963435] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1268.970725] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b4b848 [ 1268.978014] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1268.985298] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000a [ 1268.992585] R13: 000000000013571a R14: 00000000000005f4 R15: badc0ffeebadface [ 1269.026074] syz-executor0: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1269.036594] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1269.041786] CPU: 0 PID: 5843 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #50 [ 1269.048988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.058367] Call Trace: [ 1269.061016] dump_stack+0x14b/0x190 [ 1269.064691] warn_alloc+0x472/0x690 [ 1269.068421] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1269.073314] ? kernel_poison_pages+0x1a0/0x360 [ 1269.078001] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1269.083778] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1269.089309] kmsan_alloc_page+0x75/0xd0 [ 1269.093311] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1269.098097] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.103022] ? __msan_poison_alloca+0x173/0x1f0 [ 1269.107725] ? should_fail+0x53/0xaa0 [ 1269.111545] ? __should_failslab+0x278/0x2a0 [ 1269.115985] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.120897] alloc_pages_vma+0x1578/0x1830 [ 1269.125186] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1269.130311] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.135198] handle_mm_fault+0x4377/0x81b0 [ 1269.139463] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.144364] __do_page_fault+0xc8b/0x17e0 [ 1269.148584] do_page_fault+0x98/0xd0 [ 1269.152320] ? page_fault+0x8/0x30 [ 1269.155883] page_fault+0x1e/0x30 [ 1269.159356] RIP: 0033:0x43e6c1 [ 1269.162592] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1269.181509] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1269.186894] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1269.194180] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1269.201466] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1269.208751] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1269.216037] R13: 00000000009300ac R14: 0000000000135d59 R15: 0000000000135d2c [ 1269.223337] warn_alloc_show_mem: 2 callbacks suppressed [ 1269.223342] Mem-Info: [ 1269.231183] active_anon:284530 inactive_anon:110 isolated_anon:0 [ 1269.231183] active_file:1608 inactive_file:1860 isolated_file:0 [ 1269.231183] unevictable:0 dirty:51 writeback:0 unstable:0 [ 1269.231183] slab_reclaimable:3339 slab_unreclaimable:9119 [ 1269.231183] mapped:51716 shmem:116 pagetables:1389 bounce:0 [ 1269.231183] free:85313 free_pcp:1004 free_cma:0 [ 1269.264587] Node 0 active_anon:1138120kB inactive_anon:440kB active_file:6432kB inactive_file:7440kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:206864kB dirty:204kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1269.292538] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1269.318700] lowmem_reserve[]: 0 2833 7259 7259 [ 1269.323325] Node 0 DMA32 free:272752kB min:26324kB low:32904kB high:39484kB active_anon:596104kB inactive_anon:4kB active_file:196kB inactive_file:2796kB unevictable:0kB writepending:84kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1536kB pagetables:2272kB bounce:0kB free_pcp:2388kB local_pcp:1308kB free_cma:0kB [ 1269.352636] lowmem_reserve[]: 0 0 4425 4425 [ 1269.357008] Node 0 Normal free:52596kB min:41112kB low:51388kB high:61664kB active_anon:541784kB inactive_anon:436kB active_file:6288kB inactive_file:5052kB unevictable:0kB writepending:120kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8384kB pagetables:3284kB bounce:0kB free_pcp:1628kB local_pcp:1128kB free_cma:0kB [ 1269.386662] lowmem_reserve[]: 0 0 0 0 [ 1269.390519] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1269.403886] Node 0 DMA32: 5274*4kB (UME) 6561*8kB (UM) 5312*16kB (UM) 1824*32kB (UME) 385*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 272944kB [ 1269.421006] Node 0 Normal: 2724*4kB (UME) 2623*8kB (UME) 690*16kB (UME) 149*32kB (ME) 28*64kB (UM) 11*128kB (UM) 5*256kB (M) 1*512kB (M) 0*1024kB 0*2048kB 0*4096kB = 52680kB [ 1269.436862] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1269.445450] 3610 total pagecache pages [ 1269.449351] 0 pages in swap cache [ 1269.452841] Swap cache stats: add 0, delete 0, find 0/0 [ 1269.458210] Free swap = 0kB [ 1269.461234] Total swap = 0kB [ 1269.464260] 1965979 pages RAM [ 1269.467374] 0 pages HighMem/MovableOnly [ 1269.471402] 102442 pages reserved [ 1269.500716] audit: type=1326 audit(1537379644.507:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5841 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:04 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:04 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1269.663994] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1269.674695] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1269.679841] CPU: 1 PID: 5856 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1269.687039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.696428] Call Trace: [ 1269.699045] dump_stack+0x14b/0x190 [ 1269.702722] warn_alloc+0x472/0x690 [ 1269.706430] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1269.711308] ? kernel_poison_pages+0x1a0/0x360 [ 1269.715985] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1269.721741] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1269.727264] kmsan_alloc_page+0x75/0xd0 [ 1269.731272] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1269.736059] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.740929] ? __msan_poison_alloca+0x173/0x1f0 [ 1269.745629] ? should_fail+0x53/0xaa0 [ 1269.749458] ? __should_failslab+0x278/0x2a0 [ 1269.753897] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.758810] alloc_pages_vma+0x1578/0x1830 [ 1269.763092] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1269.768223] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.773109] handle_mm_fault+0x4377/0x81b0 [ 1269.777370] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.782299] __do_page_fault+0xc8b/0x17e0 [ 1269.786510] do_page_fault+0x98/0xd0 [ 1269.790247] ? page_fault+0x8/0x30 [ 1269.793812] page_fault+0x1e/0x30 [ 1269.797284] RIP: 0033:0x43e6c1 17:54:04 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1269.800502] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1269.819434] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1269.824821] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1269.832107] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1269.839416] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1269.846706] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1269.853995] R13: 00000000009300ac R14: 0000000000135fd8 R15: 0000000000135fab [ 1269.882305] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1269.892825] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1269.897985] CPU: 1 PID: 5857 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1269.905195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1269.914567] Call Trace: [ 1269.917192] dump_stack+0x14b/0x190 [ 1269.920863] warn_alloc+0x472/0x690 [ 1269.924561] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1269.929460] ? kernel_poison_pages+0x1a0/0x360 [ 1269.934145] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1269.939926] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1269.945481] kmsan_alloc_page+0x75/0xd0 [ 1269.949499] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1269.954292] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.959171] ? __msan_poison_alloca+0x173/0x1f0 [ 1269.963876] ? should_fail+0x53/0xaa0 [ 1269.967705] ? __should_failslab+0x278/0x2a0 [ 1269.972140] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.977063] alloc_pages_vma+0x1578/0x1830 [ 1269.981359] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1269.986526] ? kmsan_set_origin_inline+0x6b/0x120 [ 1269.991458] handle_mm_fault+0x4377/0x81b0 [ 1269.995731] ? kmsan_set_origin_inline+0x6b/0x120 [ 1270.000652] __do_page_fault+0xc8b/0x17e0 [ 1270.004865] do_page_fault+0x98/0xd0 [ 1270.008611] ? page_fault+0x8/0x30 [ 1270.012192] page_fault+0x1e/0x30 [ 1270.015673] RIP: 0033:0x40052d [ 1270.018904] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1270.037833] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1270.043225] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1270.050526] RDX: 000000000000000c RSI: 0000000000000000 RDI: 000000000259d848 [ 1270.057827] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1270.065120] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1270.072436] R13: 0000000000135938 R14: 0000000000000559 R15: badc0ffeebadface [ 1270.079750] warn_alloc_show_mem: 1 callbacks suppressed [ 1270.079756] Mem-Info: [ 1270.087609] active_anon:284506 inactive_anon:107 isolated_anon:0 [ 1270.087609] active_file:1509 inactive_file:1757 isolated_file:0 [ 1270.087609] unevictable:0 dirty:53 writeback:0 unstable:0 [ 1270.087609] slab_reclaimable:3339 slab_unreclaimable:9119 [ 1270.087609] mapped:51500 shmem:116 pagetables:1400 bounce:0 [ 1270.087609] free:85739 free_pcp:952 free_cma:0 [ 1270.120940] Node 0 active_anon:1138024kB inactive_anon:428kB active_file:5688kB inactive_file:6912kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:205652kB dirty:212kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1270.148898] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1270.175075] lowmem_reserve[]: 0 2833 7259 7259 [ 1270.179723] Node 0 DMA32 free:276208kB min:26324kB low:32904kB high:39484kB active_anon:595924kB inactive_anon:0kB active_file:204kB inactive_file:772kB unevictable:0kB writepending:84kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1344kB pagetables:1984kB bounce:0kB free_pcp:2820kB local_pcp:1464kB free_cma:0kB [ 1270.208927] lowmem_reserve[]: 0 0 4425 4425 17:54:05 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:05 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1270.213303] Node 0 Normal free:51852kB min:41112kB low:51388kB high:61664kB active_anon:542060kB inactive_anon:428kB active_file:5456kB inactive_file:5756kB unevictable:0kB writepending:128kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8256kB pagetables:3616kB bounce:0kB free_pcp:1004kB local_pcp:288kB free_cma:0kB [ 1270.242890] lowmem_reserve[]: 0 0 0 0 [ 1270.246745] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1270.260126] Node 0 DMA32: 6024*4kB (UME) 6636*8kB (UM) 5312*16kB (UM) 1824*32kB (UME) 391*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 276928kB [ 1270.277289] Node 0 Normal: 2843*4kB (ME) 2620*8kB (UME) 689*16kB (UME) 147*32kB (ME) 16*64kB (UM) 6*128kB (M) 3*256kB (UM) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 51132kB [ 1270.292954] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1270.301632] 2901 total pagecache pages [ 1270.305532] 0 pages in swap cache [ 1270.309000] Swap cache stats: add 0, delete 0, find 0/0 [ 1270.314372] Free swap = 0kB [ 1270.317425] Total swap = 0kB [ 1270.320456] 1965979 pages RAM [ 1270.323571] 0 pages HighMem/MovableOnly [ 1270.327552] 102442 pages reserved 17:54:05 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1270.454330] syz-executor2: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1270.465002] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1270.470175] CPU: 1 PID: 5874 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #50 [ 1270.477373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1270.486764] Call Trace: [ 1270.489410] dump_stack+0x14b/0x190 [ 1270.493079] warn_alloc+0x472/0x690 [ 1270.496768] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1270.501640] ? kernel_poison_pages+0x1a0/0x360 [ 1270.506314] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1270.512070] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1270.517589] kmsan_alloc_page+0x75/0xd0 [ 1270.521594] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1270.526378] ? kmsan_set_origin_inline+0x6b/0x120 [ 1270.531272] ? __msan_poison_alloca+0x173/0x1f0 [ 1270.535974] ? should_fail+0x53/0xaa0 [ 1270.539805] ? __should_failslab+0x278/0x2a0 [ 1270.544238] ? kmsan_set_origin_inline+0x6b/0x120 [ 1270.549151] alloc_pages_vma+0x1578/0x1830 [ 1270.553462] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1270.558593] ? kmsan_set_origin_inline+0x6b/0x120 [ 1270.563484] handle_mm_fault+0x4377/0x81b0 [ 1270.567744] ? kmsan_set_origin_inline+0x6b/0x120 [ 1270.572651] __do_page_fault+0xc8b/0x17e0 [ 1270.576855] do_page_fault+0x98/0xd0 [ 1270.580599] ? page_fault+0x8/0x30 [ 1270.584170] page_fault+0x1e/0x30 [ 1270.587642] RIP: 0033:0x43e6c1 17:54:05 executing program 4: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:05 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1270.590858] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1270.609784] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1270.615180] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1270.622472] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1270.630312] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1270.637603] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1270.644895] R13: 00000000009300ac R14: 00000000001362ef R15: 00000000001362c2 17:54:05 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:05 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) r2 = creat(&(0x7f0000000800)='./file0\x00', 0x8) recvfrom$inet6(r0, &(0x7f0000000700)=""/204, 0xcc, 0x10000, &(0x7f0000000180)={0xa, 0x4e20, 0x3f, @loopback, 0x3}, 0x1c) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000840)={0x9, 0x108, 0xfa00, {r1, 0x75, "9527f7", "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"}}, 0x110) write$vnet(0xffffffffffffffff, &(0x7f0000000540)={0x1, {&(0x7f0000000440)=""/193, 0xc1, &(0x7f0000000600)=""/226}}, 0x68) [ 1270.794588] audit: type=1326 audit(1537379645.806:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5886 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:06 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:06 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:06 executing program 4: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:06 executing program 1: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:06 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:06 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x48000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') write$vnet(0xffffffffffffffff, &(0x7f0000000540)={0x1, {&(0x7f0000000440)=""/193, 0xc1, &(0x7f0000000600)=""/226}}, 0x68) [ 1271.851298] warn_alloc: 8 callbacks suppressed [ 1271.851324] syz-executor0: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1271.866511] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1271.871667] CPU: 1 PID: 5906 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #50 [ 1271.878877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1271.888253] Call Trace: [ 1271.890878] dump_stack+0x14b/0x190 [ 1271.894568] warn_alloc+0x472/0x690 [ 1271.898267] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1271.903241] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1271.908998] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1271.914530] kmsan_alloc_page+0x75/0xd0 [ 1271.918545] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1271.923336] ? kmsan_set_origin_inline+0x6b/0x120 [ 1271.928212] ? __msan_poison_alloca+0x173/0x1f0 [ 1271.932919] ? should_fail+0x53/0xaa0 [ 1271.936747] ? __should_failslab+0x278/0x2a0 [ 1271.941196] ? kmsan_set_origin_inline+0x6b/0x120 [ 1271.946122] alloc_pages_vma+0x1578/0x1830 [ 1271.950441] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1271.955575] ? kmsan_set_origin_inline+0x6b/0x120 [ 1271.960487] handle_mm_fault+0x4377/0x81b0 [ 1271.964758] ? kmsan_set_origin_inline+0x6b/0x120 [ 1271.969664] __do_page_fault+0xc8b/0x17e0 [ 1271.973861] do_page_fault+0x98/0xd0 [ 1271.975263] IPVS: ftp: loaded support on port[0] = 21 [ 1271.977616] ? page_fault+0x8/0x30 [ 1271.977638] page_fault+0x1e/0x30 [ 1271.977656] RIP: 0033:0x43e6c1 [ 1271.977690] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1271.977713] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1271.977730] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1271.977740] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1271.977764] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1272.039293] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1272.046588] R13: 00000000009300ac R14: 000000000013685c R15: 000000000013682f [ 1272.053915] warn_alloc_show_mem: 1 callbacks suppressed [ 1272.053921] Mem-Info: [ 1272.061768] active_anon:284558 inactive_anon:107 isolated_anon:0 [ 1272.061768] active_file:1327 inactive_file:1630 isolated_file:0 [ 1272.061768] unevictable:0 dirty:29 writeback:0 unstable:0 [ 1272.061768] slab_reclaimable:3341 slab_unreclaimable:9111 [ 1272.061768] mapped:51077 shmem:116 pagetables:1441 bounce:0 [ 1272.061768] free:84957 free_pcp:947 free_cma:0 [ 1272.095095] Node 0 active_anon:1138232kB inactive_anon:428kB active_file:5308kB inactive_file:6520kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:204308kB dirty:116kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1272.123072] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1272.149243] lowmem_reserve[]: 0 2833 7259 7259 [ 1272.153873] Node 0 DMA32 free:272452kB min:26324kB low:32904kB high:39484kB active_anon:596040kB inactive_anon:8kB active_file:268kB inactive_file:544kB unevictable:0kB writepending:44kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1920kB pagetables:2184kB bounce:0kB free_pcp:1712kB local_pcp:1212kB free_cma:0kB [ 1272.183111] lowmem_reserve[]: 0 0 4425 4425 [ 1272.187485] Node 0 Normal free:51028kB min:41112kB low:51388kB high:61664kB active_anon:542088kB inactive_anon:420kB active_file:5040kB inactive_file:5976kB unevictable:0kB writepending:72kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8384kB pagetables:3580kB bounce:0kB free_pcp:2244kB local_pcp:1452kB free_cma:0kB [ 1272.217066] lowmem_reserve[]: 0 0 0 0 [ 1272.220912] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1272.234270] Node 0 DMA32: 5797*4kB (ME) 6454*8kB (UM) 5306*16kB (UM) 1815*32kB (UME) 360*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 272196kB [ 1272.251305] Node 0 Normal: 2663*4kB (ME) 2645*8kB (UME) 690*16kB (UME) 151*32kB (UME) 18*64kB (UM) 7*128kB (UM) 4*256kB (UM) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 51268kB [ 1272.267125] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1272.275714] 3073 total pagecache pages [ 1272.279698] 0 pages in swap cache [ 1272.283168] Swap cache stats: add 0, delete 0, find 0/0 [ 1272.288537] Free swap = 0kB [ 1272.291563] Total swap = 0kB [ 1272.294592] 1965979 pages RAM [ 1272.297708] 0 pages HighMem/MovableOnly [ 1272.301691] 102442 pages reserved 17:54:07 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1272.455945] syz-executor2: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1272.466493] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1272.471643] CPU: 0 PID: 5918 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #50 [ 1272.478845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.488212] Call Trace: [ 1272.490826] dump_stack+0x14b/0x190 [ 1272.494486] warn_alloc+0x472/0x690 [ 1272.498200] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1272.503078] ? kernel_poison_pages+0x1a0/0x360 [ 1272.507770] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1272.513520] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1272.519043] kmsan_alloc_page+0x75/0xd0 [ 1272.523075] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1272.527858] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.532847] ? __msan_poison_alloca+0x173/0x1f0 [ 1272.537544] ? should_fail+0x53/0xaa0 [ 1272.541365] ? __should_failslab+0x278/0x2a0 [ 1272.545879] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.550787] alloc_pages_vma+0x1578/0x1830 [ 1272.555067] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1272.560197] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.565095] handle_mm_fault+0x4377/0x81b0 [ 1272.569360] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.574291] __do_page_fault+0xc8b/0x17e0 [ 1272.578493] do_page_fault+0x98/0xd0 [ 1272.582231] ? page_fault+0x8/0x30 [ 1272.585795] page_fault+0x1e/0x30 [ 1272.589271] RIP: 0033:0x43e6c1 [ 1272.592488] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1272.611434] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1272.616819] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1272.624113] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1272.631667] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1272.638956] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1272.646252] R13: 00000000009300ac R14: 0000000000136ac1 R15: 0000000000136a94 [ 1272.695537] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1272.706062] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1272.711217] CPU: 0 PID: 5921 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1272.718435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.727806] Call Trace: [ 1272.730441] dump_stack+0x14b/0x190 [ 1272.734100] warn_alloc+0x472/0x690 [ 1272.737803] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1272.742683] ? kernel_poison_pages+0x1a0/0x360 [ 1272.747360] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1272.753141] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1272.758668] kmsan_alloc_page+0x75/0xd0 [ 1272.762692] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1272.767479] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.772346] ? __msan_poison_alloca+0x173/0x1f0 [ 1272.777064] ? should_fail+0x53/0xaa0 [ 1272.780884] ? __should_failslab+0x278/0x2a0 [ 1272.785314] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.790226] alloc_pages_vma+0x1578/0x1830 [ 1272.794511] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1272.799643] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.804535] handle_mm_fault+0x4377/0x81b0 [ 1272.808796] ? kmsan_set_origin_inline+0x6b/0x120 [ 1272.813707] __do_page_fault+0xc8b/0x17e0 [ 1272.817908] do_page_fault+0x98/0xd0 [ 1272.821645] ? page_fault+0x8/0x30 [ 1272.825217] page_fault+0x1e/0x30 [ 1272.828696] RIP: 0033:0x40052d 17:54:07 executing program 0: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1272.831910] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1272.850830] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1272.856210] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1272.863502] RDX: 000000000000000c RSI: 0000000000000000 RDI: 000000000259d848 [ 1272.870786] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1272.878081] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000a [ 1272.885369] R13: 000000000013654c R14: 000000000000055b R15: badc0ffeebadface 17:54:07 executing program 1: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:08 executing program 4: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1272.995557] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1273.006117] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1273.011277] CPU: 0 PID: 5926 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1273.018481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.027849] Call Trace: [ 1273.030477] dump_stack+0x14b/0x190 [ 1273.034148] warn_alloc+0x472/0x690 [ 1273.037851] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1273.042732] ? kernel_poison_pages+0x1a0/0x360 [ 1273.047439] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1273.053201] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1273.058730] kmsan_alloc_page+0x75/0xd0 [ 1273.062738] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1273.067524] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.072417] ? __msan_poison_alloca+0x173/0x1f0 [ 1273.077118] ? should_fail+0x53/0xaa0 [ 1273.080939] ? __should_failslab+0x278/0x2a0 [ 1273.085376] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.090313] alloc_pages_vma+0x1578/0x1830 [ 1273.094596] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1273.099730] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.104621] handle_mm_fault+0x4377/0x81b0 [ 1273.108881] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.113782] __do_page_fault+0xc8b/0x17e0 [ 1273.117983] do_page_fault+0x98/0xd0 [ 1273.121725] ? page_fault+0x8/0x30 [ 1273.125297] page_fault+0x1e/0x30 [ 1273.128771] RIP: 0033:0x43e6c1 [ 1273.131987] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1273.150907] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1273.156294] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1273.163578] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1273.170863] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1273.178146] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1273.185436] R13: 00000000009300ac R14: 0000000000136cdc R15: 0000000000136caf [ 1273.228126] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1273.238805] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1273.243976] CPU: 0 PID: 5935 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1273.251189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.260564] Call Trace: [ 1273.263187] dump_stack+0x14b/0x190 [ 1273.266855] warn_alloc+0x472/0x690 [ 1273.270553] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1273.275468] ? kernel_poison_pages+0x1a0/0x360 [ 1273.280195] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1273.285961] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1273.291526] kmsan_alloc_page+0x75/0xd0 [ 1273.295553] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1273.300352] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.305264] ? __msan_poison_alloca+0x173/0x1f0 [ 1273.309978] ? should_fail+0x53/0xaa0 [ 1273.313816] ? __should_failslab+0x278/0x2a0 [ 1273.318268] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.323199] alloc_pages_vma+0x1578/0x1830 [ 1273.327501] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1273.332644] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.337561] handle_mm_fault+0x4377/0x81b0 [ 1273.341828] ? kmsan_set_origin_inline+0x6b/0x120 [ 1273.346756] __do_page_fault+0xc8b/0x17e0 [ 1273.350975] do_page_fault+0x98/0xd0 [ 1273.354739] page_fault+0x1e/0x30 [ 1273.358245] RIP: 0010:__se_sys_waitid+0x79f/0xc00 [ 1273.359347] IPVS: ftp: loaded support on port[0] = 21 [ 1273.363128] Code: f8 fe ff ff 48 89 df e8 8f 48 9f 00 83 38 00 48 8b 5d 98 4c 8b 6d 88 0f 85 80 03 00 00 48 83 7d b0 00 0f 85 87 03 00 00 31 c0 <44> 89 33 85 c0 74 0a e8 b5 53 44 00 e9 cd 02 00 00 4c 8d bd f8 fe [ 1273.363144] RSP: 0018:ffff88009e64fd60 EFLAGS: 00010246 [ 1273.363166] RAX: 0000000000000000 RBX: 0000000020000740 RCX: ffff88008badfdf8 [ 1273.363183] RDX: ffff88008badfdf8 RSI: aaaaaaaaaaaab000 RDI: ffffea0003b65da0 [ 1273.363199] RBP: ffff88009e64ff00 R08: ffffffff7fffffff R09: 0000000000000000 [ 1273.363215] R10: 0000000000000000 R11: ffffffff81221840 R12: 0000000020000740 [ 1273.363229] R13: ffffffffffffffea R14: 0000000000000000 R15: 0000000000000000 [ 1273.363259] ? __wake_up_parent+0xb0/0xb0 [ 1273.363311] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1273.438894] ? prepare_exit_to_usermode+0x13f/0x410 [ 1273.443954] ? syscall_return_slowpath+0xdb/0x700 [ 1273.448875] __x64_sys_waitid+0x62/0x80 [ 1273.452981] do_syscall_64+0xb8/0x100 [ 1273.456815] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 1273.462033] RIP: 0033:0x4572d9 [ 1273.465253] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1273.484177] RSP: 002b:00007fe75c16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 1273.491919] RAX: ffffffffffffffda RBX: 00007fe75c1706d4 RCX: 00000000004572d9 [ 1273.499210] RDX: 0000000020000740 RSI: 0000000000000000 RDI: 0000000000000000 [ 1273.506505] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1273.513803] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1273.521096] R13: 00000000004d7ce0 R14: 00000000004caab1 R15: 0000000000000000 [ 1273.528639] warn_alloc_show_mem: 3 callbacks suppressed [ 1273.528645] Mem-Info: [ 1273.536514] active_anon:284559 inactive_anon:108 isolated_anon:0 [ 1273.536514] active_file:1080 inactive_file:1316 isolated_file:0 [ 1273.536514] unevictable:0 dirty:38 writeback:0 unstable:0 [ 1273.536514] slab_reclaimable:3341 slab_unreclaimable:9117 [ 1273.536514] mapped:50753 shmem:116 pagetables:1439 bounce:0 [ 1273.536514] free:85334 free_pcp:1032 free_cma:0 [ 1273.569936] Node 0 active_anon:1138236kB inactive_anon:432kB active_file:4196kB inactive_file:5148kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:202780kB dirty:152kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1273.597904] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1273.624108] lowmem_reserve[]: 0 2833 7259 7259 [ 1273.628772] Node 0 DMA32 free:273032kB min:26324kB low:32904kB high:39484kB active_anon:596020kB inactive_anon:8kB active_file:276kB inactive_file:564kB unevictable:0kB writepending:72kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1728kB pagetables:2124kB bounce:0kB free_pcp:1980kB local_pcp:692kB free_cma:0kB [ 1273.657908] lowmem_reserve[]: 0 0 4425 4425 [ 1273.662332] Node 0 Normal free:52904kB min:41112kB low:51388kB high:61664kB active_anon:542116kB inactive_anon:424kB active_file:4028kB inactive_file:4396kB unevictable:0kB writepending:80kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8448kB pagetables:3632kB bounce:0kB free_pcp:2068kB local_pcp:764kB free_cma:0kB [ 1273.691842] lowmem_reserve[]: 0 0 0 0 [ 1273.695810] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1273.709182] Node 0 DMA32: 5938*4kB (UME) 6418*8kB (UM) 5309*16kB (UM) 1815*32kB (UME) 373*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 273352kB 17:54:08 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x48000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') write$vnet(0xffffffffffffffff, &(0x7f0000000540)={0x1, {&(0x7f0000000440)=""/193, 0xc1, &(0x7f0000000600)=""/226}}, 0x68) [ 1273.726440] Node 0 Normal: 3311*4kB (UME) 2693*8kB (UME) 690*16kB (UME) 145*32kB (UME) 16*64kB (UM) 4*128kB (UM) 3*256kB (UM) 2*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 53796kB [ 1273.742365] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1273.750999] 2036 total pagecache pages [ 1273.754912] 0 pages in swap cache [ 1273.758408] Swap cache stats: add 0, delete 0, find 0/0 [ 1273.763785] Free swap = 0kB [ 1273.766816] Total swap = 0kB [ 1273.769852] 1965979 pages RAM [ 1273.772970] 0 pages HighMem/MovableOnly [ 1273.776955] 102442 pages reserved 17:54:08 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:08 executing program 0: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:08 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x48000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') write$vnet(0xffffffffffffffff, &(0x7f0000000540)={0x1, {&(0x7f0000000440)=""/193, 0xc1, &(0x7f0000000600)=""/226}}, 0x68) 17:54:08 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1274.041973] syz-executor0: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1274.052715] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1274.057882] CPU: 1 PID: 5951 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #50 [ 1274.065081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.074542] Call Trace: [ 1274.077168] dump_stack+0x14b/0x190 [ 1274.080835] warn_alloc+0x472/0x690 [ 1274.084535] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1274.089448] ? kernel_poison_pages+0x1a0/0x360 [ 1274.094155] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1274.099955] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1274.105503] kmsan_alloc_page+0x75/0xd0 [ 1274.109518] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1274.114312] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.119193] ? __msan_poison_alloca+0x173/0x1f0 [ 1274.123937] ? should_fail+0x53/0xaa0 [ 1274.127755] ? __should_failslab+0x278/0x2a0 [ 1274.132195] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.137105] alloc_pages_vma+0x1578/0x1830 [ 1274.141413] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1274.146543] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.151456] handle_mm_fault+0x4377/0x81b0 [ 1274.155738] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.160639] __do_page_fault+0xc8b/0x17e0 [ 1274.164828] do_page_fault+0x98/0xd0 [ 1274.168574] ? page_fault+0x8/0x30 [ 1274.172134] page_fault+0x1e/0x30 [ 1274.175614] RIP: 0033:0x43e6c1 [ 1274.178833] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1274.197761] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1274.203143] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1274.210441] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1274.217728] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1274.225013] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1274.232296] R13: 00000000009300ac R14: 00000000001370f2 R15: 00000000001370c5 [ 1274.239596] Mem-Info: [ 1274.242082] active_anon:284519 inactive_anon:109 isolated_anon:0 [ 1274.242082] active_file:1083 inactive_file:942 isolated_file:32 [ 1274.242082] unevictable:0 dirty:44 writeback:0 unstable:0 [ 1274.242082] slab_reclaimable:3341 slab_unreclaimable:9131 [ 1274.242082] mapped:50542 shmem:116 pagetables:1420 bounce:0 [ 1274.242082] free:85977 free_pcp:747 free_cma:0 [ 1274.275437] Node 0 active_anon:1138076kB inactive_anon:436kB active_file:4332kB inactive_file:3768kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:202168kB dirty:176kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1274.303580] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1274.329856] lowmem_reserve[]: 0 2833 7259 7259 [ 1274.334500] Node 0 DMA32 free:275200kB min:26324kB low:32904kB high:39484kB active_anon:595928kB inactive_anon:8kB active_file:52kB inactive_file:488kB unevictable:0kB writepending:72kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1472kB pagetables:1916kB bounce:0kB free_pcp:2348kB local_pcp:1508kB free_cma:0kB [ 1274.363716] lowmem_reserve[]: 0 0 4425 4425 [ 1274.368094] Node 0 Normal free:52804kB min:41112kB low:51388kB high:61664kB active_anon:542164kB inactive_anon:428kB active_file:4048kB inactive_file:3280kB unevictable:0kB writepending:104kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8576kB pagetables:3764kB bounce:0kB free_pcp:640kB local_pcp:260kB free_cma:0kB [ 1274.397578] lowmem_reserve[]: 0 0 0 0 [ 1274.401442] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1274.414785] Node 0 DMA32: 6152*4kB (UME) 6446*8kB (UM) 5309*16kB (UM) 1815*32kB (UME) 388*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 275392kB [ 1274.431889] Node 0 Normal: 3330*4kB (ME) 2624*8kB (UME) 682*16kB (ME) 143*32kB (ME) 14*64kB (UM) 2*128kB (M) 2*256kB (M) 2*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 52488kB [ 1274.447351] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1274.455965] 2188 total pagecache pages [ 1274.459866] 0 pages in swap cache [ 1274.463329] Swap cache stats: add 0, delete 0, find 0/0 [ 1274.468703] Free swap = 0kB [ 1274.471739] Total swap = 0kB [ 1274.474767] 1965979 pages RAM [ 1274.477879] 0 pages HighMem/MovableOnly [ 1274.481873] 102442 pages reserved 17:54:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000009c0)="2e69bac5c5129255ce05f0fb109e7e4b5005e7d641664a75a48f9fd49a5b6b0dce639018a300f9bd58bb27776df6f007496b81fc21d351028bb272fca27fc1f84ad589d9b1513a98648b5bf534926a580a9a2c8623be1195e44ffaaaf0fd824bff1b5b883c7069f02ca9d8545efe7497082612e5d936da32cc1d5f68d94dc7444fa575d3d50b1563a60f90309797c9cf913ac26da3fc481a821d7260a430383585ce01ec66afdff128bfe6bad4d3766f820dc2d01e0a3f5514da9f38ae6dedabebca0e764b46645005b7514b632164be53573ed62501f36816729e8760269060f33bbcfeac895475d01418067105239a4afa26f91472ea9ae3fe1564c08ca78272dbb237b5e441b6407452bd492f9460bbf953aead3975466b677995ceebcd324874f42ab970a77799e747229484093eef8656a2e5e092d7337b159ee8ef257e208a43ccf218c0daf71a31b6f00b80cb7a723d69defaa5c700ad689a59990f3be3fdec396ab92dacd9a14c885fc2ff3eefa00e14622a6e5f0dbe1b1b0b38cd028b06760bfb5cc446a79553cfc4f98318df42ddf1df78bdc002cd53b28eb79d641d7f410f765a2318115bd7a5abbc7a62e42b1c27541ea75529afff2056966613c1849a1e620308b9b8593076108f919987a156b6285cfd0e10bb69eb1bbad96b9e85c9df20b8a1dffe49a31219df629f600588df68dc90fb8a776a85603f5b2eaa011e9fd5d824193a2763484d3f77fbc042bb0901ec086821c7c9768998eab2e04d612b991a87e0ab4946d1a5e679ad1a92a34615a71266ae147d9a7fb45a8cbe83a01fd8da9606217c092efeee25b4c98def83a117c8ce0e6a3b39a8f556ae353537027b715073cdf1a97838d8e46040cad32ea0b52fd13b7876e6e4cad0cea180b8b2145be8c61a35358911fc40176d0d0397df4c5e50f91a91f54e85f1ceed691c8f421a11214b5ec38845f910a8ff4a0564ce88f007670c06c8a32d077a7d3fb45997bd0ed3fe02035e1ecb2e6f39d36a73543c36d5d718c209c4d7d3e03efd742cc13ebfa31ea0eb0182e48a6aa661f26cdc69d324fc71aa47435114e86d62f1ef8e48ceb9ba70313f59d7aede3b6cd13da9152e39f4d96011b53bea62c6ceb80650653d0d2072132d98ed563e0a1e23872c8d829e5349d0a6f836466de8d7914fd06a1ce37ac61beea0a34fa586e47db492c3757a0437e0cabba670988f7cc5a468e2cd0943602885693c5612a889e3e53bf1b7bbda46867863060a2dd535f48d9e482cc9b8839a0b6bee08bf54f7239e92a7331c4230d41e78377a60a1b0d9f5b09f27566a2ad08100ce516b402ad2fa89e8e211cfb3f81d225534f3a5eb846f1efb34c9a9b494658aa26bf71b8c531683061c1c921a1d0f96ebcdba75b0df66cf1883dd6a2ae8870247f0b2231cee54a47efec27172537ab82049a7eae87069c6ff81e480d4165503bdb3f8148a8a460d369df768ba9088d6bfeb6f63d58a3340b2cee793245071a047d472041d84e1634d744dc9895e2ee87259f5c3d3fd443fcd6c81e7f65cea865bd6a77270b6fa2c6065a65ae54c7c2dfcd1f9a6a483528db7ddafa2677f2e0933a231da4b85c691704beed00dd7b21d53ef36600ab47dffc3d2630420172c5eddb325c0787b0a34b1afdadd361d1abfc67ac743f517fc7829ad55984b5fd20c9dec43ee91347a0c796d35c1a5647976577d87a1782c4e6bd95baf02782c31f506b574be791925254ecc6f421f9b79305a700c77d33e68726ccc3752c8a32f0bd7033ac77848beb22e697cf7fc1f360df415dd1b3fab316fb69f4a2135fb9873c8c949f2f04c3ff1b606e8f0869cba820a383138c8e322031c099cfa6c18af53052e2443cd48df707688a5ff562d14497327136f7949462023f193eeb58ae11372dd0056b63fdaad12f269f2913e9f3b9b43440a645f4542fa191f178b25a554dbdb0d6677e22d67bcf1d18902793569f49668ff9351d52ccf7e6b61e33a6f9f7392fa548491e10a826125add5c70f63a54a9bfc52c84c7451942aa1f924bebe0f6c01abc0aaaabfeda3b28c79161a797d367bbfb3359d5dd982b196ea2aceb6cc6a2511855e683f239435f589f0903700348ba9b307b86d511785f2dc2a0767391ac5049b71d00fa6880f6726e71b678538a5eba16df95dda84d3a7c77d20055f5f5607ee3a351951c76efe19521deda7bc6f3576606b3a2580af9d85eb275cee0253bd8bdf672820389cb6177baf9b20bfa4d5223318f8f354f3cfe8dd2f5c39264b305ecdeec41ee56306412f42025d1ac7e8c71f06d92ff6723d09e7415def9457ce95aa6d7be0f281daa813fb653f4b3ee2f1ab22df36a484f5d973197c3e669a858475b523a11d48f4c01223e1f96855ce52c8d0ae7604491b0abf4e6a394dbd0cb34cf5addaf8ee0fed7552ba8f0812a62f1338619c9d451a0ba7204d1baf10c7457ac70ea8c853be6d9c4822a602ca2fc6025e2b118799560db54f6dea25f50425bd3b691c2cf5bb10f7eacde2005dba1b97eafabdfb205ac7f9f4b953c92636201b7a72cb1045790c41f47882e601cf343ca60e7501cae72a4b4824a31c7ae94e9b85b90694c2cf38fe1b82cdfb7927fbf351d3f5578a655a4786869e5a871c1de0e64661704befef1eeb247216428bdb903da46368069801daa30bcba60db7350610bde018e7f8dac3694c9620cc1fb2b7ae89857ceceef258660094648e0c2bd01b9967dba4db23eebc8da452d613cecb95d814350bfd7ea12595bef9bf0c0d2c76e2a1dff7da59a9fbe9ad7d57216bf88fefc6fa0f7a3493c92e959c6e89885c7bf4526e264793401114e383afa4191aa7968d132936f8dd3bbcb4a0574ec0a70ce08d37346f1e1c19f4b8862247cc71328cfd46ceeee0ceb5f939e3ab1e65c557d79e70879971e17272efcf88da6bbd7954f47ca62fa4dbf7c1e2a8f7862d9d7ccaa3abf654d7ba8248592ec52df00709d6d08c879ff93f66549c93ff1599cc03f85c04bfb14c75ae0cbe4346288a163ec1cb3518136c0f244a83c81e30c510a98e6cd26620ea1fc74bc73adb8317a040363d8fb56ce40120584fe9de58fe19e0cec122330469a1f387c03939b04043c90fed5bab8cb9534af5b4ef8234e1bd8fb3bd773b4d2dc1a382b086e2862b1405a5d9131d00c19b07ea7d054bedcbd8746fe248d4b88e30f90979d37f5f34aa3cb198d76300bbadbd4f7b7e083419ce3e49b3d508e9491bbf35240a6eaa17915683e5d6533e2f6d8752427592d594c21e0c84ec56bc64328845024c89db319d27f475e38a9341912f8d210096ce5432cc221c473a14cbecfd9dc3acd8be888bc98e513d02030a27286d6e4e32ebeb2b702603c6479797e40d4854fa4e1bad83c7c0f37c5f86aa412f01d5e479664405890ad111af24546187a7308597526d6c1f1e9036b9916b33436a6742232a1f9c5947cb005fed6b0084ed53c911da4b50edd6264c878d4cf02892e148565791278a2b7f394a9aaaa477bc0cf67b5ec41f61f31cc40f3d28d1cd6f29bd3d178c3cd1e5bec00cf7c42be89d0b4a24fda47a61f9ecce36c710f4308e6d08e0aa305044a48d3cb287ee773b61a15292d7ffaea6527ebfd3878b6eb17e2ee3167cd68d74f763dcb1ace82a5634d09a96fdce23b2e50794668b4f2e601de270d51138ad9179629c2b1dd452a61310d0a4afe9fcc95936467e33f107a8b13e1bfb9965956c56c586ac2020231ce0f39095ff5d1db86e6dd2b527664cde472c0018b3e1045b65317b16d1681cb31fd15ebee524bd597e87774153ff4c226a4f280bc4f0ea36c2ca868b914cee7b9c992d6f133129732ad352a0592cd155208053deaaa64f4849dae6fdd403fafce6d52870e16ed0e85660974cb7aacfeefb852a27416e6eaecec583e4fa5cef1c94a9044155b7cc720f75732df1f9e5833787e9a223178548231b1fd3a068047cf1c7a7b920eefa5f32ff39c96cda396def51248774958e6264c9ba0d01492ff1620410694190dc334e0a81dd7248f015d4391b8762d64292942edb4df4bb4937d9f161d00abc745e2a51c69de6cb91a122911904be7d27457c2e3e30c74fb13ccdbcacc5122bbb19522c18c5db8da7755e55856529c17c2a3c5ac38e1959ee92e093b5dc4a5008f8d049bb0f576397aad51f672c1318f0e076c6c18b0d40fde9e61728e79450b97987ffcc8a95b8745beaeacb185a3fa24f77f01aea373d391aaa1acf6e8b2d6e103cc53a6ca81533fcd2cb4f8fb5e6f7dab9670fbca01832761f801d7d95ad8e8d3e057f15502da05a83d6cd2f61f111133d0fd46198f17dd2d70098c3ee74055b6f70a3ad1f9091965e391dfe4a477925de6b49d4741051f679e6cd824c93f7817e28d9f835d2169e1a1f4227f67e61c2f10f1779a29e318d201f5e192cdc383b7e6365a25de9ecd7a5e2d20c015a0119ec67044d8b5e06f3437424f1036c2379c43c02c6bb36012f6bb1d2289ca09fb37c2fddc5ad06e4dc45f8ec83344c736131d1c14edd47ba0c745069c714f7e2825a6d74d9e3a909abbba5c416150fe14a16bc44f57d14e9af270112c24c2abd0f3f0dacedabb8d4554f7a80cb7578f710bc49a54250841b8047aa33824f8f88d341b8dc0cd5c5c852cd318a35b3733f756131a863bcec3a9cc6488ce26d80e35157c49011613ea93df3b046e1608a653ce78fb02d8e6a469e532adf436a3dbd4e36556e77b01a8d776b86aafe6d1b30d08676b7007e43ff4c7ba30e0ef1ba41c547020dd45424eeab481f6197dfc2f07037653c08738722691509c18231b1255c579e37050b6165dd9f4c9bf2fbfbb9331825307027c5cbf64467fc988692ce87437e49030feb2863347c1b14b978d3edbefd0c500e9d1bb91561804e5a76df08900d1eb60a277f94fed621738489560dd4200a5ba4754b2c3dd4aa82943d555e7854ed0c452e51b66bd4c725ed08430f3c58d2877a522e33aad4e0aa8cf2a3346b80d7bf9c3f16fb14fd877dd25888591dfcc7336f6d6f9d72355d9d4da453b63c23bdb5a3b9d621b4ee2f203226f96b50234f25c9d69a9328bfc9a02003dadc2d027ae76bc885f0b922996a70d84dfa1471c2168ce3165f42bb155fe564f5ea3796325819b1b91fcd9920a4bb7f487fcac7175d02f57f7282164ec289f0d62d800cc6d5f9f05af96aaecdaff6360d94ccfa4b56969cf7c317bd4be53a7520989f62f9a48178bc45dd11ea482c7e144db01c767ed5268a428376a311921b3ac4fcd576afef402b3cd8747bad2a92b25e6cf5b07c9ff6ff2476d0e322ce85a24274d86d96baab688fa161c6aeefb8b6199b7a1aa843475ebd683dfd63c58dbbc03e1a1e808e5f2e742c975814f60054d5062ccfb507564c8b4c7dc59c74b5dae2c691d5abdc79182a43364b73ad2fee697280193bca8d68fe22c7b17c4bef363879fc10fbde9e2be90ea88a3e1918149726d344cb6b8649cd9beca5e9faf9ac8eb2f07d97db5535e490ccf0c9d225da571be0f9ef44544e7f68597b8e249fd0a0445ad8799cac327323c8f7af4cee2dbdbd303a5440408fae2449f137ecb38544ea3a71fb702314634ac1bcb8006a45a60e566278e881c538e8eb20db026d435b50bdf1cba3c4d1d262e40e83d4838b722939dee93711a940459af6ad5e4fef0afca3fabbde05d49e7111c3df1e88b9ba68a549945b86a2adf79dfa4d40be3ff998e47e2a946baa92398452b7dc997a79bd4b6a2c1ea91944d5ace5b28ad609e4e224e3d9dd86eb4a626df149", 0x1000}, {&(0x7f00000019c0)="ae03d0ed7a2128a555ffeeb9e0b0028e67bd5f8d5f6a1c43d4d3eaec9e848efe72914b848b4d0cd2d6beee521731bc4c7f17fd92e10a82825dca226978418252c98a7a23ec044bf3a819ee6a3d6d26db167ad9969da91b75026e977aadb51e0a21c4947fa24f373f5a33ec6918b226cb5abf3818a51cc53148d1bdb3610f39ae99b5ac51fedf8783561e5f21a11df6547d3c41ae7c29a1a092d1098fdb5a4bed0d22681bf3c1223754e8b0a69774aab10c7ff00ed8da910a13ee1349ede36ce4bb04", 0xc2}, {&(0x7f0000000500)="58d6c9eb5bbdf7fd543e20581d624acb0d17cb7fbfe1e526cb540bf0160f6354501ead2d09dd95e4d2175d774f34fa596d4ae5f1b9515a10453d3475d993a182d0dcab611b4590bfcec80d37877167a82689b747b7c59ca898671c29e2d808d0a6c8d9ac12d04eb22c404e3d8dafcc12eb7c80fe6d16024918859252ace7b39938560dceda8fbfdd2d1c65195b602600", 0x90}], 0x3, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1274.490866] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1274.501428] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1274.506592] CPU: 0 PID: 5957 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1274.513794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.523170] Call Trace: [ 1274.525795] dump_stack+0x14b/0x190 [ 1274.529472] warn_alloc+0x472/0x690 [ 1274.533181] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1274.538068] ? kernel_poison_pages+0x1a0/0x360 [ 1274.542761] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1274.548532] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1274.554067] kmsan_alloc_page+0x75/0xd0 [ 1274.558105] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1274.562897] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.567773] ? __msan_poison_alloca+0x173/0x1f0 [ 1274.571559] IPVS: ftp: loaded support on port[0] = 21 [ 1274.572480] ? should_fail+0x53/0xaa0 [ 1274.572500] ? __should_failslab+0x278/0x2a0 [ 1274.572525] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.572588] alloc_pages_vma+0x1578/0x1830 [ 1274.595209] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1274.600350] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.605273] handle_mm_fault+0x4377/0x81b0 [ 1274.609545] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.614487] __do_page_fault+0xc8b/0x17e0 [ 1274.618702] do_page_fault+0x98/0xd0 [ 1274.622463] ? page_fault+0x8/0x30 [ 1274.626036] page_fault+0x1e/0x30 [ 1274.629863] RIP: 0033:0x40052d 17:54:09 executing program 4: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1274.633088] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1274.652019] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1274.657443] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1274.664771] RDX: 000000000000000c RSI: 0000000000000000 RDI: 000000000259d848 [ 1274.672074] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1274.679420] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1274.686719] R13: 0000000000136b81 R14: 000000000000055c R15: badc0ffeebadface [ 1274.716200] audit: type=1326 audit(1537379649.726:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5957 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 1274.769840] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1274.780426] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1274.785588] CPU: 0 PID: 5964 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1274.792794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.802168] Call Trace: [ 1274.804786] dump_stack+0x14b/0x190 [ 1274.808458] warn_alloc+0x472/0x690 [ 1274.812143] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1274.817028] ? kernel_poison_pages+0x1a0/0x360 [ 1274.821724] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1274.827472] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1274.832995] kmsan_alloc_page+0x75/0xd0 [ 1274.837012] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1274.841795] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.846683] ? __msan_poison_alloca+0x173/0x1f0 [ 1274.851378] ? should_fail+0x53/0xaa0 [ 1274.855219] ? __should_failslab+0x278/0x2a0 [ 1274.859648] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.864561] alloc_pages_vma+0x1578/0x1830 [ 1274.868837] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1274.873972] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.878866] handle_mm_fault+0x4377/0x81b0 [ 1274.883123] ? kmsan_set_origin_inline+0x6b/0x120 [ 1274.888027] __do_page_fault+0xc8b/0x17e0 [ 1274.892224] do_page_fault+0x98/0xd0 [ 1274.895958] ? page_fault+0x8/0x30 [ 1274.899523] page_fault+0x1e/0x30 [ 1274.902995] RIP: 0033:0x43e6b1 17:54:10 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1274.906231] Code: 8d 15 d3 1d 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 1274.925279] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1274.930673] RAX: 0000000020000040 RBX: fffffffffffffffe RCX: 0000000000000063 [ 1274.937960] RDX: 0000000000000009 RSI: 0000000000730020 RDI: 0000000020000040 [ 1274.945255] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 1274.952550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000008 [ 1274.959832] R13: 0000000000136ca9 R14: 000000000000065f R15: badc0ffeebadface 17:54:10 executing program 4: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000009c0)=""/4096) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000002d80)=0xffffffff) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') recvmsg(r1, &(0x7f0000002d40)={&(0x7f00000006c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f00000019c0)=""/133, 0x85}, {&(0x7f0000001a80)=""/231, 0xe7}, {&(0x7f0000001b80)=""/135, 0x87}, {&(0x7f0000000580)=""/34, 0x22}, {&(0x7f0000001c40)=""/83, 0x53}, {&(0x7f0000001cc0)=""/4096, 0x1000}], 0x6, &(0x7f0000000600)=""/18, 0x12, 0x5}, 0x10123) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000000500)=""/80, 0x50, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r2, 0x4) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1275.183206] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1275.193780] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1275.198962] CPU: 0 PID: 5975 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1275.206177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.215565] Call Trace: [ 1275.218191] dump_stack+0x14b/0x190 [ 1275.221857] warn_alloc+0x472/0x690 [ 1275.225551] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1275.230463] ? kernel_poison_pages+0x1a0/0x360 [ 1275.235084] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1275.240541] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1275.246306] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1275.251832] kmsan_alloc_page+0x75/0xd0 [ 1275.255842] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1275.260631] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.265509] ? __msan_poison_alloca+0x173/0x1f0 [ 1275.270207] ? should_fail+0x53/0xaa0 [ 1275.274030] ? __should_failslab+0x278/0x2a0 [ 1275.278469] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.283378] alloc_pages_vma+0x1578/0x1830 [ 1275.287692] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1275.292824] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.297727] handle_mm_fault+0x4377/0x81b0 [ 1275.301987] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.306890] __do_page_fault+0xc8b/0x17e0 [ 1275.311115] do_page_fault+0x98/0xd0 [ 1275.314980] ? page_fault+0x8/0x30 [ 1275.318557] page_fault+0x1e/0x30 [ 1275.322036] RIP: 0033:0x43e6c1 [ 1275.325258] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1275.344184] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1275.349574] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1275.356865] RDX: 000000000000000a RSI: 0000000000730050 RDI: 00000000200005c0 [ 1275.364152] RBP: 0000000000930aa0 R08: 0000000000000003 R09: 0000000000000001 [ 1275.371441] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1275.378733] R13: 00000000009300ac R14: 0000000000137566 R15: 0000000000137539 [ 1275.403493] syz-executor3: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1275.414040] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1275.419198] CPU: 0 PID: 5979 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #50 [ 1275.426427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.435804] Call Trace: [ 1275.438460] dump_stack+0x14b/0x190 [ 1275.442128] warn_alloc+0x472/0x690 [ 1275.445828] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1275.450718] ? kernel_poison_pages+0x1a0/0x360 [ 1275.455348] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1275.460839] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1275.466602] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1275.472129] kmsan_alloc_page+0x75/0xd0 [ 1275.476146] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1275.480941] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.485823] ? __msan_poison_alloca+0x173/0x1f0 [ 1275.490527] ? should_fail+0x53/0xaa0 [ 1275.494359] ? __should_failslab+0x278/0x2a0 [ 1275.498823] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.503755] alloc_pages_vma+0x1578/0x1830 [ 1275.508039] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1275.513183] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.518083] handle_mm_fault+0x4377/0x81b0 [ 1275.522847] ? kmsan_set_origin_inline+0x6b/0x120 [ 1275.527764] __do_page_fault+0xc8b/0x17e0 [ 1275.531974] do_page_fault+0x98/0xd0 [ 1275.535721] ? page_fault+0x8/0x30 [ 1275.539285] page_fault+0x1e/0x30 [ 1275.542763] RIP: 0033:0x43e6b1 [ 1275.545980] Code: 8d 15 d3 1d 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 1275.564921] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1275.570319] RAX: 0000000020000040 RBX: fffffffffffffffe RCX: 0000000000000063 [ 1275.577608] RDX: 0000000000000009 RSI: 0000000000730020 RDI: 0000000020000040 [ 1275.584901] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 1275.592190] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1275.599478] R13: 00000000001370d3 R14: 00000000000005fa R15: badc0ffeebadface [ 1275.606791] warn_alloc_show_mem: 3 callbacks suppressed [ 1275.606797] Mem-Info: [ 1275.614927] active_anon:284486 inactive_anon:106 isolated_anon:0 [ 1275.614927] active_file:1240 inactive_file:1138 isolated_file:0 [ 1275.614927] unevictable:0 dirty:57 writeback:0 unstable:0 [ 1275.614927] slab_reclaimable:3341 slab_unreclaimable:9270 [ 1275.614927] mapped:50644 shmem:116 pagetables:1416 bounce:0 [ 1275.614927] free:85352 free_pcp:900 free_cma:0 [ 1275.648303] Node 0 active_anon:1137944kB inactive_anon:424kB active_file:4960kB inactive_file:4552kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:202576kB dirty:228kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1275.676260] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1275.702690] lowmem_reserve[]: 0 2833 7259 7259 [ 1275.707326] Node 0 DMA32 free:272648kB min:26324kB low:32904kB high:39484kB active_anon:596080kB inactive_anon:0kB active_file:140kB inactive_file:588kB unevictable:0kB writepending:72kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1728kB pagetables:2040kB bounce:0kB free_pcp:1504kB local_pcp:220kB free_cma:0kB [ 1275.736468] lowmem_reserve[]: 0 0 4425 4425 [ 1275.740835] Node 0 Normal free:52856kB min:41112kB low:51388kB high:61664kB active_anon:542100kB inactive_anon:424kB active_file:4572kB inactive_file:3764kB unevictable:0kB writepending:156kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7872kB pagetables:3624kB bounce:0kB free_pcp:2096kB local_pcp:664kB free_cma:0kB [ 1275.770411] lowmem_reserve[]: 0 0 0 0 [ 1275.774259] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1275.787629] Node 0 DMA32: 5839*4kB (ME) 6439*8kB (UM) 5309*16kB (UM) 1809*32kB (UME) 376*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 273124kB [ 1275.804769] Node 0 Normal: 3274*4kB (UME) 2638*8kB (UME) 684*16kB (UME) 145*32kB (UME) 28*64kB (UM) 8*128kB (UM) 2*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 53112kB [ 1275.820232] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1275.828818] 2494 total pagecache pages [ 1275.832722] 0 pages in swap cache 17:54:10 executing program 1: set_robust_list(&(0x7f00000003c0)={&(0x7f0000000380)={&(0x7f0000000180)}, 0x0, &(0x7f0000000340)}, 0x18) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000008c0), 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0xffffffffffffffc1, &(0x7f0000000500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000002ec0)=0xe8) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid_for_children\x00') fstat(r0, &(0x7f0000000480)) io_setup(0x0, &(0x7f0000000200)) r2 = getpgrp(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f80)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000003180)=0xc) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003800)={{{@in=@broadcast, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003900)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003980)) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000039c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000003ac0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) 17:54:10 executing program 0: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:10 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1275.836190] Swap cache stats: add 0, delete 0, find 0/0 [ 1275.841562] Free swap = 0kB [ 1275.844591] Total swap = 0kB [ 1275.847617] 1965979 pages RAM [ 1275.850729] 0 pages HighMem/MovableOnly [ 1275.854713] 102442 pages reserved [ 1275.956277] audit: type=1326 audit(1537379650.968:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5986 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:11 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:11 executing program 4: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:11 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1276.396209] audit: type=1326 audit(1537379651.407:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6002 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:11 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:11 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000580), 0x32d) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(r1, &(0x7f0000000500)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000002c0)=0x2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:11 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1276.982101] warn_alloc: 6 callbacks suppressed [ 1276.982126] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1276.997261] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1277.002441] CPU: 0 PID: 6007 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1277.009648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.019057] Call Trace: [ 1277.021700] dump_stack+0x14b/0x190 [ 1277.025375] warn_alloc+0x472/0x690 [ 1277.029106] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1277.033999] ? kernel_poison_pages+0x1a0/0x360 [ 1277.038695] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1277.044468] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1277.049989] kmsan_alloc_page+0x75/0xd0 [ 1277.053999] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1277.058798] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.063674] ? __msan_poison_alloca+0x173/0x1f0 [ 1277.068385] ? should_fail+0x53/0xaa0 [ 1277.072226] ? __should_failslab+0x278/0x2a0 [ 1277.076659] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.081573] alloc_pages_vma+0x1578/0x1830 [ 1277.085857] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1277.090985] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.095886] handle_mm_fault+0x4377/0x81b0 [ 1277.100142] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.105045] __do_page_fault+0xc8b/0x17e0 [ 1277.109246] do_page_fault+0x98/0xd0 [ 1277.113138] ? page_fault+0x8/0x30 [ 1277.116722] page_fault+0x1e/0x30 [ 1277.120196] RIP: 0033:0x43e6c1 [ 1277.123435] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1277.142354] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1277.147763] RAX: 0000000020000240 RBX: fffffffffffffffe RCX: 000000000000642f [ 1277.155049] RDX: 000000000000000e RSI: 0000000000730020 RDI: 0000000020000240 [ 1277.162330] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 1277.169615] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000b [ 1277.176903] R13: 000000000013781c R14: 000000000000055e R15: badc0ffeebadface [ 1277.184205] Mem-Info: [ 1277.186678] active_anon:284523 inactive_anon:110 isolated_anon:0 [ 1277.186678] active_file:1518 inactive_file:1302 isolated_file:0 [ 1277.186678] unevictable:0 dirty:79 writeback:0 unstable:0 [ 1277.186678] slab_reclaimable:3341 slab_unreclaimable:9273 [ 1277.186678] mapped:50855 shmem:116 pagetables:1378 bounce:0 [ 1277.186678] free:83891 free_pcp:694 free_cma:0 [ 1277.220096] Node 0 active_anon:1138092kB inactive_anon:440kB active_file:6072kB inactive_file:5208kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:203420kB dirty:316kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1277.248047] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1277.274214] lowmem_reserve[]: 0 2833 7259 7259 [ 1277.278843] Node 0 DMA32 free:268512kB min:26324kB low:32904kB high:39484kB active_anon:596268kB inactive_anon:24kB active_file:980kB inactive_file:1048kB unevictable:0kB writepending:88kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1728kB pagetables:2100kB bounce:0kB free_pcp:1632kB local_pcp:1236kB free_cma:0kB [ 1277.308221] lowmem_reserve[]: 0 0 4425 4425 [ 1277.312593] Node 0 Normal free:51148kB min:41112kB low:51388kB high:61664kB active_anon:541924kB inactive_anon:416kB active_file:5028kB inactive_file:4128kB unevictable:0kB writepending:228kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8320kB pagetables:3412kB bounce:0kB free_pcp:1144kB local_pcp:628kB free_cma:0kB [ 1277.342158] lowmem_reserve[]: 0 0 0 0 [ 1277.345999] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1277.359358] Node 0 DMA32: 5546*4kB (UME) 6032*8kB (UM) 5309*16kB (UM) 1812*32kB (UME) 372*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 268536kB [ 1277.376486] Node 0 Normal: 3071*4kB (UME) 2639*8kB (UME) 687*16kB (UME) 146*32kB (UME) 11*64kB (UM) 7*128kB (UM) 2*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51172kB [ 1277.391932] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1277.400515] 2962 total pagecache pages [ 1277.404437] 0 pages in swap cache [ 1277.407905] Swap cache stats: add 0, delete 0, find 0/0 [ 1277.413286] Free swap = 0kB [ 1277.416309] Total swap = 0kB [ 1277.419340] 1965979 pages RAM [ 1277.422455] 0 pages HighMem/MovableOnly [ 1277.426442] 102442 pages reserved 17:54:12 executing program 3 (fault-call:0 fault-nth:0): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:12 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:12 executing program 4: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1277.588549] syz-executor3: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1277.599108] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1277.604284] CPU: 1 PID: 6015 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #50 [ 1277.611492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.620871] Call Trace: [ 1277.623506] dump_stack+0x14b/0x190 [ 1277.627176] warn_alloc+0x472/0x690 [ 1277.630868] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1277.635774] ? kernel_poison_pages+0x1a0/0x360 [ 1277.640494] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1277.646253] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1277.651789] kmsan_alloc_page+0x75/0xd0 [ 1277.655806] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1277.660602] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.665497] ? __msan_poison_alloca+0x173/0x1f0 [ 1277.670217] ? should_fail+0x53/0xaa0 [ 1277.674051] ? __should_failslab+0x278/0x2a0 [ 1277.678498] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.683441] alloc_pages_vma+0x1578/0x1830 [ 1277.687729] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1277.692857] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.697747] handle_mm_fault+0x4377/0x81b0 [ 1277.702012] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.706948] __do_page_fault+0xc8b/0x17e0 [ 1277.711160] do_page_fault+0x98/0xd0 [ 1277.714906] ? page_fault+0x8/0x30 [ 1277.718469] page_fault+0x1e/0x30 [ 1277.721976] RIP: 0033:0x40052d [ 1277.725200] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1277.744125] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1277.749518] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1277.756804] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b4b848 [ 1277.764088] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1277.771375] R10: 0000000000000075 R11: 0000000000000246 R12: 000000000000000b [ 1277.778688] R13: 00000000001379de R14: 00000000000005fc R15: badc0ffeebadface [ 1277.797815] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1277.808350] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1277.813531] CPU: 0 PID: 6019 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1277.820734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.830110] Call Trace: [ 1277.832730] dump_stack+0x14b/0x190 [ 1277.836423] warn_alloc+0x472/0x690 [ 1277.840119] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1277.845021] ? kernel_poison_pages+0x1a0/0x360 [ 1277.849649] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1277.855106] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1277.860923] kmsan_alloc_page+0x75/0xd0 [ 1277.864933] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1277.869723] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.874597] ? __msan_poison_alloca+0x173/0x1f0 [ 1277.879315] ? should_fail+0x53/0xaa0 [ 1277.883140] ? __should_failslab+0x278/0x2a0 [ 1277.887585] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.892499] alloc_pages_vma+0x1578/0x1830 [ 1277.896793] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1277.901948] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.906847] handle_mm_fault+0x4377/0x81b0 [ 1277.911112] ? kmsan_set_origin_inline+0x6b/0x120 [ 1277.916017] __do_page_fault+0xc8b/0x17e0 [ 1277.920229] do_page_fault+0x98/0xd0 [ 1277.923971] ? page_fault+0x8/0x30 [ 1277.927536] page_fault+0x1e/0x30 [ 1277.931018] RIP: 0033:0x43e6c1 [ 1277.934241] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1277.953161] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1277.958546] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1277.965831] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1277.973116] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1277.980425] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1277.987717] R13: 00000000009300ac R14: 0000000000137f98 R15: 0000000000137f6b 17:54:13 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:13 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000580), 0x32d) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(r1, &(0x7f0000000500)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000002c0)=0x2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1278.168175] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1278.178719] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1278.183877] CPU: 0 PID: 6031 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1278.191085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.200454] Call Trace: [ 1278.203081] dump_stack+0x14b/0x190 [ 1278.206755] warn_alloc+0x472/0x690 [ 1278.210481] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1278.215371] ? kernel_poison_pages+0x1a0/0x360 [ 1278.220085] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1278.225842] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1278.231370] kmsan_alloc_page+0x75/0xd0 [ 1278.235431] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1278.240219] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.245089] ? __msan_poison_alloca+0x173/0x1f0 [ 1278.249785] ? should_fail+0x53/0xaa0 [ 1278.253610] ? __should_failslab+0x278/0x2a0 [ 1278.258065] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.262973] alloc_pages_vma+0x1578/0x1830 [ 1278.267260] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1278.272386] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.277303] handle_mm_fault+0x4377/0x81b0 [ 1278.281563] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.286485] __do_page_fault+0xc8b/0x17e0 [ 1278.290704] do_page_fault+0x98/0xd0 [ 1278.294458] ? page_fault+0x8/0x30 [ 1278.298024] page_fault+0x1e/0x30 [ 1278.301499] RIP: 0033:0x43e6b1 [ 1278.304718] Code: 8d 15 d3 1d 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 1278.323635] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1278.329042] RAX: 00000000200003c0 RBX: fffffffffffffffe RCX: 0000000000000063 [ 1278.336438] RDX: 0000000000000009 RSI: 0000000000730068 RDI: 00000000200003c0 [ 1278.343723] RBP: 0000000000930aa0 R08: 0000000000000009 R09: 0000000000000001 [ 1278.351011] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1278.358296] R13: 00000000009300ac R14: 0000000000138110 R15: 00000000001380e3 [ 1278.365604] warn_alloc_show_mem: 2 callbacks suppressed [ 1278.365610] Mem-Info: [ 1278.373460] active_anon:284538 inactive_anon:107 isolated_anon:0 [ 1278.373460] active_file:1450 inactive_file:1419 isolated_file:10 [ 1278.373460] unevictable:0 dirty:85 writeback:0 unstable:0 [ 1278.373460] slab_reclaimable:3341 slab_unreclaimable:9274 [ 1278.373460] mapped:50855 shmem:116 pagetables:1398 bounce:0 [ 1278.373460] free:83780 free_pcp:741 free_cma:0 [ 1278.406863] Node 0 active_anon:1138152kB inactive_anon:428kB active_file:5800kB inactive_file:5676kB unevictable:0kB isolated(anon):0kB isolated(file):40kB mapped:203420kB dirty:340kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1278.434917] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1278.461119] lowmem_reserve[]: 0 2833 7259 7259 [ 1278.465748] Node 0 DMA32 free:267776kB min:26324kB low:32904kB high:39484kB active_anon:596228kB inactive_anon:12kB active_file:1056kB inactive_file:1156kB unevictable:0kB writepending:112kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1664kB pagetables:2240kB bounce:0kB free_pcp:1384kB local_pcp:412kB free_cma:0kB [ 1278.495296] lowmem_reserve[]: 0 0 4425 4425 [ 1278.499673] Node 0 Normal free:51440kB min:41112kB low:51388kB high:61664kB active_anon:541912kB inactive_anon:416kB active_file:4744kB inactive_file:4488kB unevictable:0kB writepending:228kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8128kB pagetables:3352kB bounce:0kB free_pcp:1580kB local_pcp:300kB free_cma:0kB [ 1278.529359] lowmem_reserve[]: 0 0 0 0 [ 1278.533231] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1278.546599] Node 0 DMA32: 5398*4kB (ME) 5993*8kB (UM) 5309*16kB (UM) 1812*32kB (UME) 375*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 267824kB 17:54:13 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1278.563678] Node 0 Normal: 3014*4kB (UME) 2629*8kB (UME) 687*16kB (UME) 146*32kB (UME) 18*64kB (UM) 8*128kB (UM) 2*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51440kB [ 1278.579141] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1278.587724] 3022 total pagecache pages [ 1278.591613] 0 pages in swap cache [ 1278.595070] Swap cache stats: add 0, delete 0, find 0/0 [ 1278.600433] Free swap = 0kB [ 1278.603451] Total swap = 0kB [ 1278.606469] 1965979 pages RAM [ 1278.609570] 0 pages HighMem/MovableOnly [ 1278.613536] 102442 pages reserved [ 1278.668019] syz-executor3: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1278.678546] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1278.683706] CPU: 0 PID: 6034 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #50 [ 1278.690913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.700269] Call Trace: [ 1278.702893] dump_stack+0x14b/0x190 [ 1278.706549] warn_alloc+0x472/0x690 [ 1278.710245] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1278.715132] ? kernel_poison_pages+0x1a0/0x360 [ 1278.719818] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1278.725576] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1278.731093] kmsan_alloc_page+0x75/0xd0 [ 1278.735099] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1278.739879] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.744751] ? __msan_poison_alloca+0x173/0x1f0 [ 1278.749453] ? should_fail+0x53/0xaa0 [ 1278.753274] ? __should_failslab+0x278/0x2a0 [ 1278.757717] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.762624] alloc_pages_vma+0x1578/0x1830 [ 1278.766920] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1278.772050] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.776947] handle_mm_fault+0x4377/0x81b0 [ 1278.781207] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.786127] __do_page_fault+0xc8b/0x17e0 [ 1278.790324] do_page_fault+0x98/0xd0 [ 1278.794064] ? page_fault+0x8/0x30 [ 1278.797628] page_fault+0x1e/0x30 [ 1278.801105] RIP: 0033:0x40052d 17:54:13 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1278.804334] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1278.823285] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1278.828680] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1278.835974] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b4b848 [ 1278.843266] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1278.850558] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000009 [ 1278.857849] R13: 0000000000137e94 R14: 00000000000005fd R15: badc0ffeebadface [ 1278.875361] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1278.885910] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1278.891068] CPU: 1 PID: 6032 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1278.898279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.907654] Call Trace: [ 1278.910281] dump_stack+0x14b/0x190 [ 1278.913948] warn_alloc+0x472/0x690 [ 1278.917652] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1278.922540] ? kernel_poison_pages+0x1a0/0x360 [ 1278.927236] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1278.933000] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1278.938537] kmsan_alloc_page+0x75/0xd0 [ 1278.942557] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1278.947353] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.952265] ? __msan_poison_alloca+0x173/0x1f0 [ 1278.956968] ? should_fail+0x53/0xaa0 [ 1278.960803] ? __should_failslab+0x278/0x2a0 [ 1278.965247] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.970179] alloc_pages_vma+0x1578/0x1830 [ 1278.974489] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1278.979624] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.984524] handle_mm_fault+0x4377/0x81b0 [ 1278.988794] ? kmsan_set_origin_inline+0x6b/0x120 [ 1278.993712] __do_page_fault+0xc8b/0x17e0 [ 1278.997921] do_page_fault+0x98/0xd0 [ 1279.001665] ? page_fault+0x8/0x30 [ 1279.005229] page_fault+0x1e/0x30 [ 1279.008703] RIP: 0033:0x43e6c1 [ 1279.011918] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1279.030839] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1279.036224] RAX: 0000000020000240 RBX: fffffffffffffffe RCX: 000000000000642f [ 1279.043510] RDX: 000000000000000e RSI: 0000000000730020 RDI: 0000000020000240 [ 1279.050797] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 1279.058095] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000013 [ 1279.065380] R13: 0000000000137c3f R14: 000000000000055f R15: badc0ffeebadface [ 1279.157563] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1279.168104] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1279.173264] CPU: 1 PID: 6040 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1279.180472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.189933] Call Trace: [ 1279.192560] dump_stack+0x14b/0x190 [ 1279.196225] warn_alloc+0x472/0x690 [ 1279.199928] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1279.204811] ? kernel_poison_pages+0x1a0/0x360 [ 1279.209456] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1279.214916] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1279.220722] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1279.226250] kmsan_alloc_page+0x75/0xd0 [ 1279.230266] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1279.235063] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.239943] ? __msan_poison_alloca+0x173/0x1f0 [ 1279.244650] ? should_fail+0x53/0xaa0 [ 1279.248483] ? __should_failslab+0x278/0x2a0 [ 1279.252925] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.257847] alloc_pages_vma+0x1578/0x1830 [ 1279.262142] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1279.267284] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.272185] handle_mm_fault+0x4377/0x81b0 [ 1279.276462] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.281376] __do_page_fault+0xc8b/0x17e0 [ 1279.285608] do_page_fault+0x98/0xd0 [ 1279.289353] ? page_fault+0x8/0x30 [ 1279.292953] page_fault+0x1e/0x30 [ 1279.296453] RIP: 0033:0x43e6c1 [ 1279.299671] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1279.318617] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1279.324014] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1279.331313] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1279.338610] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1279.345956] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1279.353274] R13: 00000000009300ac R14: 00000000001384ed R15: 00000000001384c0 [ 1279.360594] warn_alloc_show_mem: 2 callbacks suppressed [ 1279.360600] Mem-Info: [ 1279.368470] active_anon:284471 inactive_anon:110 isolated_anon:0 [ 1279.368470] active_file:544 inactive_file:1041 isolated_file:0 [ 1279.368470] unevictable:0 dirty:9 writeback:0 unstable:0 [ 1279.368470] slab_reclaimable:3341 slab_unreclaimable:9269 [ 1279.368470] mapped:50058 shmem:116 pagetables:1410 bounce:0 [ 1279.368470] free:85988 free_pcp:827 free_cma:0 [ 1279.401625] Node 0 active_anon:1137884kB inactive_anon:440kB active_file:2176kB inactive_file:4280kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:200232kB dirty:36kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1279.429486] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1279.455650] lowmem_reserve[]: 0 2833 7259 7259 [ 1279.460281] Node 0 DMA32 free:272256kB min:26324kB low:32904kB high:39484kB active_anon:596120kB inactive_anon:16kB active_file:476kB inactive_file:80kB unevictable:0kB writepending:124kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1408kB pagetables:2280kB bounce:0kB free_pcp:1940kB local_pcp:576kB free_cma:0kB [ 1279.489491] lowmem_reserve[]: 0 0 4425 4425 [ 1279.493863] Node 0 Normal free:55792kB min:41112kB low:51388kB high:61664kB active_anon:541880kB inactive_anon:424kB active_file:2232kB inactive_file:4200kB unevictable:0kB writepending:260kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8128kB pagetables:3360kB bounce:0kB free_pcp:1180kB local_pcp:528kB free_cma:0kB [ 1279.523640] lowmem_reserve[]: 0 0 0 0 [ 1279.527505] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1279.540872] Node 0 DMA32: 6075*4kB (UME) 6138*8kB (UM) 5309*16kB (UM) 1818*32kB (UME) 388*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 272716kB [ 1279.557976] Node 0 Normal: 3850*4kB (UME) 2681*8kB (UME) 693*16kB (UME) 153*32kB (UME) 16*64kB (UM) 8*128kB (UM) 2*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55392kB [ 1279.573450] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1279.582037] 1730 total pagecache pages [ 1279.585933] 0 pages in swap cache [ 1279.589427] Swap cache stats: add 0, delete 0, find 0/0 [ 1279.594799] Free swap = 0kB [ 1279.597821] Total swap = 0kB [ 1279.600851] 1965979 pages RAM [ 1279.603969] 0 pages HighMem/MovableOnly 17:54:14 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1279.607957] 102442 pages reserved 17:54:14 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:14 executing program 1 (fault-call:0 fault-nth:0): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1279.733932] syz-executor2: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1279.744476] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1279.749636] CPU: 0 PID: 6048 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #50 [ 1279.756852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.766232] Call Trace: [ 1279.768857] dump_stack+0x14b/0x190 [ 1279.772529] warn_alloc+0x472/0x690 [ 1279.776228] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1279.781114] ? kernel_poison_pages+0x1a0/0x360 [ 1279.785801] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1279.791564] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1279.797101] kmsan_alloc_page+0x75/0xd0 [ 1279.801114] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1279.805910] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.810791] ? __msan_poison_alloca+0x173/0x1f0 [ 1279.815504] ? should_fail+0x53/0xaa0 [ 1279.819337] ? __should_failslab+0x278/0x2a0 [ 1279.823785] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.828728] alloc_pages_vma+0x1578/0x1830 [ 1279.833017] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1279.838160] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.843057] handle_mm_fault+0x4377/0x81b0 [ 1279.847323] ? kmsan_set_origin_inline+0x6b/0x120 [ 1279.852246] __do_page_fault+0xc8b/0x17e0 [ 1279.856483] do_page_fault+0x98/0xd0 [ 1279.860227] ? page_fault+0x8/0x30 [ 1279.863803] page_fault+0x1e/0x30 [ 1279.867283] RIP: 0033:0x43e6c1 [ 1279.870502] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1279.889449] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1279.894841] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1279.902136] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1279.909448] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1279.916741] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1279.924031] R13: 00000000009300ac R14: 000000000013872e R15: 0000000000138701 [ 1279.941176] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1279.951693] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1279.956842] CPU: 0 PID: 6052 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1279.964039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.973434] Call Trace: [ 1279.976060] dump_stack+0x14b/0x190 [ 1279.979721] warn_alloc+0x472/0x690 [ 1279.983430] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1279.988317] ? kernel_poison_pages+0x1a0/0x360 [ 1279.992991] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1279.998746] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1280.004263] kmsan_alloc_page+0x75/0xd0 [ 1280.008269] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1280.013075] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.017943] ? __msan_poison_alloca+0x173/0x1f0 [ 1280.022645] ? should_fail+0x53/0xaa0 [ 1280.026472] ? __should_failslab+0x278/0x2a0 [ 1280.030906] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.035898] alloc_pages_vma+0x1578/0x1830 [ 1280.040204] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1280.045332] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.050220] handle_mm_fault+0x4377/0x81b0 [ 1280.054479] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.059382] __do_page_fault+0xc8b/0x17e0 [ 1280.063612] do_page_fault+0x98/0xd0 [ 1280.067353] ? page_fault+0x8/0x30 [ 1280.070961] page_fault+0x1e/0x30 [ 1280.074459] RIP: 0033:0x40052d [ 1280.077682] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1280.096608] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1280.102052] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1280.109338] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1280.116627] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1280.123916] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 1280.131205] R13: 00000000001380e1 R14: 0000000000000663 R15: badc0ffeebadface [ 1280.153027] syz-executor0: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1280.163561] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1280.168719] CPU: 1 PID: 6049 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #50 [ 1280.175929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.185300] Call Trace: [ 1280.187915] dump_stack+0x14b/0x190 [ 1280.191577] warn_alloc+0x472/0x690 [ 1280.195281] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1280.200176] ? kernel_poison_pages+0x1a0/0x360 [ 1280.204862] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1280.210644] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1280.216185] kmsan_alloc_page+0x75/0xd0 [ 1280.220209] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1280.225003] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.229883] ? __msan_poison_alloca+0x173/0x1f0 [ 1280.234601] ? should_fail+0x53/0xaa0 [ 1280.238457] ? __should_failslab+0x278/0x2a0 [ 1280.242904] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.247822] alloc_pages_vma+0x1578/0x1830 [ 1280.252118] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1280.257255] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.262182] handle_mm_fault+0x4377/0x81b0 [ 1280.266474] ? kmsan_set_origin_inline+0x6b/0x120 [ 1280.271424] __do_page_fault+0xc8b/0x17e0 [ 1280.275643] do_page_fault+0x98/0xd0 [ 1280.279419] ? page_fault+0x8/0x30 [ 1280.282995] page_fault+0x1e/0x30 [ 1280.286480] RIP: 0033:0x43e6c1 [ 1280.289699] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1280.308633] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1280.314034] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1280.321328] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1280.328625] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1280.335930] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1280.343243] R13: 00000000009300ac R14: 00000000001388d1 R15: 00000000001388a4 17:54:15 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x8001, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) inotify_init() write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:15 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:15 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:15 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:15 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:15 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000007c0)=0xc) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r2 = dup2(r1, r1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000480)) syz_open_dev$dmmidi(&(0x7f00000006c0)='/dev/dmmidi#\x00', 0x101, 0x800) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000500)={0x0, 0x2c, &(0x7f00000004c0)=[@in6={0xa, 0x4e24, 0x5, @loopback, 0x3}, @in={0x2, 0x4e22, @broadcast}]}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000800)=ANY=[], &(0x7f0000000680)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getsockopt$inet6_int(r3, 0x29, 0x41ff, &(0x7f0000000900), &(0x7f0000000940)=0xfffffffffffffef8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:16 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0xff) sendfile(r2, r1, &(0x7f0000000000)=0x1, 0x9) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") getpgid(0xffffffffffffffff) sendfile(r3, r4, &(0x7f0000000180)=0xf0100, 0x100000001) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000d40)=0x100000227) setuid(r5) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0xfffffffffffffdee, 0xfa00, {0x0, &(0x7f0000000080), 0xfffffffffffffffe}}, 0xfffffffffffffe99) readv(r4, &(0x7f0000000c80)=[{&(0x7f0000000480)=""/181, 0xb5}, {&(0x7f0000000540)=""/203, 0xcb}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000800)=""/90, 0x5a}, {&(0x7f0000000880)=""/219, 0xdb}, {&(0x7f0000000980)=""/242, 0xf2}, {&(0x7f0000000b00)=""/110, 0x6e}, {&(0x7f00000000c0)=""/1, 0x1}, {&(0x7f0000000780)=""/15, 0xf}, {&(0x7f0000000b80)=""/206, 0xce}], 0xa) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:16 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 17:54:16 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:16 executing program 0: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:16 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 17:54:16 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000480)="6e6e74e8ffffff") unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:17 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 1282.146781] warn_alloc: 12 callbacks suppressed [ 1282.146808] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1282.162145] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1282.167305] CPU: 1 PID: 6098 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1282.174509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.183879] Call Trace: [ 1282.186505] dump_stack+0x14b/0x190 [ 1282.190184] warn_alloc+0x472/0x690 [ 1282.193882] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1282.198768] ? kernel_poison_pages+0x1a0/0x360 [ 1282.203497] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1282.209261] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1282.214797] kmsan_alloc_page+0x75/0xd0 [ 1282.218812] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1282.223607] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.228485] ? __msan_poison_alloca+0x173/0x1f0 [ 1282.233201] ? should_fail+0x53/0xaa0 [ 1282.237058] ? __should_failslab+0x278/0x2a0 [ 1282.241509] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.246465] alloc_pages_vma+0x1578/0x1830 [ 1282.250772] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1282.255906] ? apic_timer_interrupt+0xa/0x20 [ 1282.260368] handle_mm_fault+0x4377/0x81b0 [ 1282.264665] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.269585] __do_page_fault+0xc8b/0x17e0 [ 1282.273799] do_page_fault+0x98/0xd0 [ 1282.277549] ? page_fault+0x8/0x30 [ 1282.281134] page_fault+0x1e/0x30 [ 1282.284623] RIP: 0033:0x40052d [ 1282.287843] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1282.306778] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1282.312180] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1282.319474] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1282.326762] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1282.334049] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000013 [ 1282.341333] R13: 0000000000138bfb R14: 0000000000000665 R15: badc0ffeebadface [ 1282.348643] warn_alloc_show_mem: 3 callbacks suppressed [ 1282.348649] Mem-Info: [ 1282.356502] active_anon:284561 inactive_anon:108 isolated_anon:0 [ 1282.356502] active_file:1246 inactive_file:2236 isolated_file:0 [ 1282.356502] unevictable:0 dirty:43 writeback:0 unstable:0 [ 1282.356502] slab_reclaimable:3340 slab_unreclaimable:9223 [ 1282.356502] mapped:51296 shmem:116 pagetables:1453 bounce:0 [ 1282.356502] free:82324 free_pcp:885 free_cma:0 [ 1282.389910] Node 0 active_anon:1138244kB inactive_anon:432kB active_file:4984kB inactive_file:8944kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:205184kB dirty:172kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1282.417858] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1282.444022] lowmem_reserve[]: 0 2833 7259 7259 [ 1282.448652] Node 0 DMA32 free:262036kB min:26324kB low:32904kB high:39484kB active_anon:596300kB inactive_anon:8kB active_file:1712kB inactive_file:3060kB unevictable:0kB writepending:60kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1984kB pagetables:2316kB bounce:0kB free_pcp:1468kB local_pcp:1124kB free_cma:0kB [ 1282.478030] lowmem_reserve[]: 0 0 4425 4425 [ 1282.482421] Node 0 Normal free:51356kB min:41112kB low:51388kB high:61664kB active_anon:541936kB inactive_anon:424kB active_file:3272kB inactive_file:5928kB unevictable:0kB writepending:112kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8064kB pagetables:3496kB bounce:0kB free_pcp:2072kB local_pcp:1372kB free_cma:0kB [ 1282.512063] lowmem_reserve[]: 0 0 0 0 [ 1282.516061] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1282.529441] Node 0 DMA32: 4795*4kB (UME) 5689*8kB (UM) 5306*16kB (UM) 1809*32kB (UME) 361*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 261940kB [ 1282.546545] Node 0 Normal: 2866*4kB (UME) 2660*8kB (UME) 686*16kB (UME) 150*32kB (UME) 25*64kB (UM) 8*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51656kB [ 1282.561910] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1282.570499] 3597 total pagecache pages [ 1282.574427] 0 pages in swap cache [ 1282.577896] Swap cache stats: add 0, delete 0, find 0/0 [ 1282.583264] Free swap = 0kB [ 1282.586290] Total swap = 0kB [ 1282.589321] 1965979 pages RAM [ 1282.592449] 0 pages HighMem/MovableOnly [ 1282.596452] 102442 pages reserved 17:54:17 executing program 0: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:17 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1282.839357] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1282.849940] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1282.855105] CPU: 0 PID: 6109 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1282.862308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.871685] Call Trace: [ 1282.874309] dump_stack+0x14b/0x190 [ 1282.877978] warn_alloc+0x472/0x690 [ 1282.881683] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1282.886562] ? kernel_poison_pages+0x1a0/0x360 [ 1282.891181] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1282.896634] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1282.902428] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1282.907953] kmsan_alloc_page+0x75/0xd0 [ 1282.911964] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1282.916762] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.921635] ? __msan_poison_alloca+0x173/0x1f0 [ 1282.926352] ? should_fail+0x53/0xaa0 [ 1282.930175] ? __should_failslab+0x278/0x2a0 [ 1282.934617] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.939537] alloc_pages_vma+0x1578/0x1830 [ 1282.943828] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1282.948966] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.953862] handle_mm_fault+0x4377/0x81b0 [ 1282.958123] ? kmsan_set_origin_inline+0x6b/0x120 [ 1282.963042] __do_page_fault+0xc8b/0x17e0 [ 1282.967250] do_page_fault+0x98/0xd0 [ 1282.971016] ? page_fault+0x8/0x30 [ 1282.974606] page_fault+0x1e/0x30 [ 1282.978085] RIP: 0033:0x43e6c1 [ 1282.981301] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1283.000230] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1283.005625] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1283.012928] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1283.020217] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1283.027505] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 17:54:18 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1283.034802] R13: 00000000009300ac R14: 0000000000139346 R15: 0000000000139319 [ 1283.067879] syz-executor0: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1283.078435] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1283.083601] CPU: 0 PID: 6110 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #50 [ 1283.090842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.100209] Call Trace: [ 1283.102829] dump_stack+0x14b/0x190 [ 1283.106508] warn_alloc+0x472/0x690 [ 1283.110215] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1283.115107] ? kernel_poison_pages+0x1a0/0x360 [ 1283.119804] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1283.125574] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1283.131106] kmsan_alloc_page+0x75/0xd0 [ 1283.135120] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1283.139910] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.144793] ? __msan_poison_alloca+0x173/0x1f0 [ 1283.149503] ? should_fail+0x53/0xaa0 [ 1283.153329] ? __should_failslab+0x278/0x2a0 [ 1283.157771] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.162698] alloc_pages_vma+0x1578/0x1830 17:54:18 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1283.166998] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1283.172145] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.177040] handle_mm_fault+0x4377/0x81b0 [ 1283.181313] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.186232] __do_page_fault+0xc8b/0x17e0 [ 1283.190479] do_page_fault+0x98/0xd0 [ 1283.194237] page_fault+0x1e/0x30 [ 1283.197758] RIP: 0010:__se_sys_waitid+0x79f/0xc00 [ 1283.202633] Code: f8 fe ff ff 48 89 df e8 8f 48 9f 00 83 38 00 48 8b 5d 98 4c 8b 6d 88 0f 85 80 03 00 00 48 83 7d b0 00 0f 85 87 03 00 00 31 c0 <44> 89 33 85 c0 74 0a e8 b5 53 44 00 e9 cd 02 00 00 4c 8d bd f8 fe [ 1283.221571] RSP: 0018:ffff880090effd60 EFLAGS: 00010246 [ 1283.226973] RAX: 0000000000000000 RBX: 0000000020000740 RCX: ffff8800a0a9fdf8 [ 1283.234276] RDX: ffff8800a0a9fdf8 RSI: aaaaaaaaaaaab000 RDI: ffffea0003659fa0 [ 1283.241575] RBP: ffff880090efff00 R08: ffffffff7fffffff R09: 0000000000000000 [ 1283.248922] R10: 0000000000000000 R11: ffffffff81221840 R12: 0000000020000740 [ 1283.256216] R13: ffffffffffffffea R14: 0000000000000000 R15: 0000000000000000 [ 1283.263526] ? __wake_up_parent+0xb0/0xb0 [ 1283.267740] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1283.273221] ? prepare_exit_to_usermode+0x13f/0x410 [ 1283.278282] ? syscall_return_slowpath+0xdb/0x700 [ 1283.283203] __x64_sys_waitid+0x62/0x80 [ 1283.287229] do_syscall_64+0xb8/0x100 [ 1283.291099] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 1283.296324] RIP: 0033:0x4572d9 [ 1283.299539] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.318547] RSP: 002b:00007ff4e6cb4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 1283.326292] RAX: ffffffffffffffda RBX: 00007ff4e6cb56d4 RCX: 00000000004572d9 [ 1283.333583] RDX: 0000000020000740 RSI: 0000000000000000 RDI: 0000000000000000 [ 1283.340870] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1283.348157] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1283.355456] R13: 00000000004d7ce0 R14: 00000000004caab1 R15: 0000000000000000 17:54:18 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:18 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:18 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x5, 0x0) inotify_add_watch(r0, &(0x7f00000004c0)='./file0\x00', 0x2) unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x9, 0x3, 0x58fe0}]}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000440)={0x80}, 0x1) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000440)={0x401, 0xa84, 0x7ff, 0x85, 0x4, 0x10001, 0x3, 0x100000000, 0x3, 0x1}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x5cd601) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1283.593551] syz-executor5: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1283.604217] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1283.609372] CPU: 0 PID: 6122 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #50 [ 1283.616603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.625972] Call Trace: [ 1283.628597] dump_stack+0x14b/0x190 [ 1283.632268] warn_alloc+0x472/0x690 [ 1283.635974] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1283.640866] ? kernel_poison_pages+0x1a0/0x360 [ 1283.645554] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1283.651316] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1283.656852] kmsan_alloc_page+0x75/0xd0 [ 1283.660859] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1283.665646] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.670524] ? __msan_poison_alloca+0x173/0x1f0 [ 1283.675339] ? should_fail+0x53/0xaa0 [ 1283.679161] ? __should_failslab+0x278/0x2a0 [ 1283.683603] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.688520] alloc_pages_vma+0x1578/0x1830 [ 1283.692807] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1283.697939] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.702837] handle_mm_fault+0x4377/0x81b0 [ 1283.707147] ? kmsan_set_origin_inline+0x6b/0x120 [ 1283.712064] __do_page_fault+0xc8b/0x17e0 [ 1283.716272] do_page_fault+0x98/0xd0 [ 1283.720029] ? page_fault+0x8/0x30 [ 1283.723611] page_fault+0x1e/0x30 [ 1283.727113] RIP: 0033:0x43e6c1 [ 1283.730330] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1283.749262] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1283.754656] RAX: 0000000020000240 RBX: fffffffffffffffe RCX: 000000000000642f [ 1283.761972] RDX: 000000000000000e RSI: 0000000000730020 RDI: 0000000020000240 [ 1283.769264] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 1283.776552] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000015 [ 1283.783843] R13: 000000000013949d R14: 0000000000000566 R15: badc0ffeebadface [ 1283.791151] warn_alloc_show_mem: 2 callbacks suppressed [ 1283.791158] Mem-Info: [ 1283.799002] active_anon:284491 inactive_anon:110 isolated_anon:0 [ 1283.799002] active_file:1267 inactive_file:2668 isolated_file:0 [ 1283.799002] unevictable:0 dirty:50 writeback:0 unstable:0 [ 1283.799002] slab_reclaimable:3340 slab_unreclaimable:9254 [ 1283.799002] mapped:51645 shmem:116 pagetables:1395 bounce:0 [ 1283.799002] free:81909 free_pcp:943 free_cma:0 [ 1283.832344] Node 0 active_anon:1137964kB inactive_anon:440kB active_file:5068kB inactive_file:10672kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:206580kB dirty:200kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1283.860380] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1283.886580] lowmem_reserve[]: 0 2833 7259 7259 [ 1283.891219] Node 0 DMA32 free:259984kB min:26324kB low:32904kB high:39484kB active_anon:596124kB inactive_anon:24kB active_file:1716kB inactive_file:4284kB unevictable:0kB writepending:84kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1984kB pagetables:2364kB bounce:0kB free_pcp:1564kB local_pcp:588kB free_cma:0kB [ 1283.920606] lowmem_reserve[]: 0 0 4425 4425 [ 1283.925006] Node 0 Normal free:51748kB min:41112kB low:51388kB high:61664kB active_anon:541972kB inactive_anon:416kB active_file:3352kB inactive_file:6312kB unevictable:0kB writepending:116kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7936kB pagetables:3216kB bounce:0kB free_pcp:2208kB local_pcp:780kB free_cma:0kB [ 1283.954573] lowmem_reserve[]: 0 0 0 0 [ 1283.958440] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1283.971820] Node 0 DMA32: 4514*4kB (UME) 5606*8kB (UM) 5303*16kB (UM) 1806*32kB (UME) 361*64kB (UME) 49*128kB (UME) 22*256kB (UM) 14*512kB (UM) 12*1024kB (UME) 0*2048kB 0*4096kB = 260008kB [ 1283.988970] Node 0 Normal: 2803*4kB (UME) 2663*8kB (UME) 686*16kB (UME) 148*32kB (UME) 32*64kB (UM) 8*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51812kB [ 1284.004340] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1284.012912] 4089 total pagecache pages [ 1284.016824] 0 pages in swap cache [ 1284.020307] Swap cache stats: add 0, delete 0, find 0/0 [ 1284.025688] Free swap = 0kB [ 1284.028718] Total swap = 0kB [ 1284.031750] 1965979 pages RAM [ 1284.034868] 0 pages HighMem/MovableOnly [ 1284.038842] 102442 pages reserved [ 1284.051787] syz-executor3: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1284.062293] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1284.067439] CPU: 0 PID: 6123 Comm: syz-executor3 Not tainted 4.19.0-rc4+ #50 [ 1284.074619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.083968] Call Trace: [ 1284.086572] dump_stack+0x14b/0x190 [ 1284.090220] warn_alloc+0x472/0x690 [ 1284.093896] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1284.098760] ? kernel_poison_pages+0x1a0/0x360 [ 1284.103436] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1284.109174] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1284.114681] kmsan_alloc_page+0x75/0xd0 [ 1284.118679] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1284.123463] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.128314] ? __msan_poison_alloca+0x173/0x1f0 [ 1284.133005] ? should_fail+0x53/0xaa0 [ 1284.136811] ? __should_failslab+0x278/0x2a0 [ 1284.141247] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.146140] alloc_pages_vma+0x1578/0x1830 [ 1284.150423] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1284.155535] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.160416] handle_mm_fault+0x4377/0x81b0 [ 1284.164665] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.169561] __do_page_fault+0xc8b/0x17e0 [ 1284.173750] do_page_fault+0x98/0xd0 [ 1284.177497] ? page_fault+0x8/0x30 [ 1284.181047] page_fault+0x1e/0x30 [ 1284.184502] RIP: 0033:0x40052d [ 1284.187704] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1284.206632] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1284.212007] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1284.219276] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b4b848 [ 1284.226548] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1284.233822] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000018 [ 1284.241092] R13: 0000000000138d60 R14: 0000000000000600 R15: badc0ffeebadface [ 1284.260595] syz-executor2: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1284.271101] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1284.276251] CPU: 0 PID: 6124 Comm: syz-executor2 Not tainted 4.19.0-rc4+ #50 [ 1284.283440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.292803] Call Trace: [ 1284.295420] dump_stack+0x14b/0x190 [ 1284.299076] warn_alloc+0x472/0x690 [ 1284.302762] __alloc_pages_nodemask+0x5ae3/0x5c80 17:54:19 executing program 0: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1284.307629] ? kernel_poison_pages+0x1a0/0x360 [ 1284.312312] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1284.318051] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1284.323562] kmsan_alloc_page+0x75/0xd0 [ 1284.327555] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1284.332327] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.337186] ? __msan_poison_alloca+0x173/0x1f0 [ 1284.341871] ? should_fail+0x53/0xaa0 [ 1284.345709] ? __should_failslab+0x278/0x2a0 [ 1284.350135] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.355070] alloc_pages_vma+0x1578/0x1830 [ 1284.359351] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1284.364472] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.369352] handle_mm_fault+0x4377/0x81b0 [ 1284.373616] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.378513] __do_page_fault+0xc8b/0x17e0 [ 1284.382718] do_page_fault+0x98/0xd0 [ 1284.386466] ? page_fault+0x8/0x30 [ 1284.390028] page_fault+0x1e/0x30 [ 1284.393490] RIP: 0033:0x43e6c1 [ 1284.396697] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1284.415606] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1284.420980] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1284.428259] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1284.435550] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1284.442826] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1284.450114] R13: 00000000009300ac R14: 00000000001398dd R15: 00000000001398b0 [ 1284.480797] syz-executor0: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1284.491322] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1284.496468] CPU: 1 PID: 6133 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #50 [ 1284.503676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.513037] Call Trace: [ 1284.515662] dump_stack+0x14b/0x190 [ 1284.519314] warn_alloc+0x472/0x690 [ 1284.523006] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1284.527887] ? kernel_poison_pages+0x1a0/0x360 [ 1284.532568] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 1284.538327] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1284.543846] kmsan_alloc_page+0x75/0xd0 [ 1284.547846] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1284.552639] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.557505] ? __msan_poison_alloca+0x173/0x1f0 [ 1284.562201] ? should_fail+0x53/0xaa0 [ 1284.566058] ? __should_failslab+0x278/0x2a0 [ 1284.570518] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.575419] alloc_pages_vma+0x1578/0x1830 [ 1284.579700] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1284.584833] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.589724] handle_mm_fault+0x4377/0x81b0 [ 1284.593990] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.598898] __do_page_fault+0xc8b/0x17e0 [ 1284.603101] do_page_fault+0x98/0xd0 [ 1284.606856] page_fault+0x1e/0x30 [ 1284.610335] RIP: 0010:__se_sys_waitid+0x79f/0xc00 [ 1284.615202] Code: f8 fe ff ff 48 89 df e8 8f 48 9f 00 83 38 00 48 8b 5d 98 4c 8b 6d 88 0f 85 80 03 00 00 48 83 7d b0 00 0f 85 87 03 00 00 31 c0 <44> 89 33 85 c0 74 0a e8 b5 53 44 00 e9 cd 02 00 00 4c 8d bd f8 fe [ 1284.634656] RSP: 0018:ffff8800843cfd60 EFLAGS: 00010246 [ 1284.640085] RAX: 0000000000000000 RBX: 0000000020000740 RCX: ffff880090f0fdf8 [ 1284.647372] RDX: ffff880090f0fdf8 RSI: aaaaaaaaaaaab000 RDI: ffffea0003196da0 [ 1284.654674] RBP: ffff8800843cff00 R08: ffffffff7fffffff R09: 0000000000000000 [ 1284.661961] R10: 0000000000000000 R11: ffffffff81221840 R12: 0000000020000740 [ 1284.669241] R13: ffffffffffffffea R14: 0000000000000000 R15: 0000000000000000 [ 1284.676542] ? __wake_up_parent+0xb0/0xb0 [ 1284.680733] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1284.686205] ? prepare_exit_to_usermode+0x13f/0x410 [ 1284.692000] ? syscall_return_slowpath+0xdb/0x700 [ 1284.696921] __x64_sys_waitid+0x62/0x80 [ 1284.700937] do_syscall_64+0xb8/0x100 [ 1284.704760] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 1284.709959] RIP: 0033:0x4572d9 [ 1284.713170] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:54:19 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1284.732105] RSP: 002b:00007ff4e6cb4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 1284.739861] RAX: ffffffffffffffda RBX: 00007ff4e6cb56d4 RCX: 00000000004572d9 [ 1284.747138] RDX: 0000000020000740 RSI: 0000000000000000 RDI: 0000000000000000 [ 1284.754437] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1284.761722] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1284.767185] syz-executor4: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1284.769012] R13: 00000000004d7ce0 R14: 00000000004caab1 R15: 0000000000000000 [ 1284.779493] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1284.786791] warn_alloc_show_mem: 2 callbacks suppressed [ 1284.786796] Mem-Info: [ 1284.791912] CPU: 0 PID: 6138 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #50 [ 1284.797285] active_anon:284523 inactive_anon:108 isolated_anon:14 [ 1284.797285] active_file:1544 inactive_file:1472 isolated_file:0 [ 1284.797285] unevictable:0 dirty:59 writeback:0 unstable:0 [ 1284.797285] slab_reclaimable:3341 slab_unreclaimable:9280 [ 1284.797285] mapped:51379 shmem:116 pagetables:1376 bounce:0 [ 1284.797285] free:83519 free_pcp:657 free_cma:0 [ 1284.799653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.806901] Node 0 active_anon:1138092kB inactive_anon:432kB active_file:6176kB inactive_file:5888kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:205516kB dirty:236kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1284.840186] Call Trace: [ 1284.849537] Node 0 [ 1284.877561] dump_stack+0x14b/0x190 [ 1284.880184] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1284.882390] warn_alloc+0x472/0x690 [ 1284.885992] lowmem_reserve[]: [ 1284.911543] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1284.915117] 0 [ 1284.918262] ? kernel_poison_pages+0x1a0/0x360 [ 1284.923083] 2833 [ 1284.924894] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1284.929446] 7259 [ 1284.931590] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1284.936863] 7259 [ 1284.938938] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1284.946726] kmsan_alloc_page+0x75/0xd0 [ 1284.952105] Node 0 DMA32 free:266768kB min:26324kB low:32904kB high:39484kB active_anon:595872kB inactive_anon:8kB active_file:1900kB inactive_file:2064kB unevictable:0kB writepending:84kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1472kB pagetables:2104kB bounce:0kB free_pcp:1032kB local_pcp:448kB free_cma:0kB [ 1284.956117] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1284.956144] ? kmsan_set_origin_inline+0x6b/0x120 [ 1284.985359] lowmem_reserve[]: [ 1284.990124] ? __msan_poison_alloca+0x173/0x1f0 [ 1284.994941] 0 [ 1284.998050] ? should_fail+0x53/0xaa0 [ 1285.002705] 0 [ 1285.004513] ? __should_failslab+0x278/0x2a0 [ 1285.008290] 4425 [ 1285.010095] ? kmsan_set_origin_inline+0x6b/0x120 [ 1285.014483] 4425 [ 1285.016588] alloc_pages_vma+0x1578/0x1830 [ 1285.023459] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1285.027653] Node 0 Normal free:51404kB min:41112kB low:51388kB high:61664kB active_anon:542004kB inactive_anon:424kB active_file:4224kB inactive_file:3904kB unevictable:0kB writepending:152kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:8256kB pagetables:3400kB bounce:0kB free_pcp:1596kB local_pcp:588kB free_cma:0kB [ 1285.032810] ? kmsan_set_origin_inline+0x6b/0x120 [ 1285.032857] handle_mm_fault+0x4377/0x81b0 [ 1285.062316] lowmem_reserve[]: [ 1285.067165] ? kmsan_set_origin_inline+0x6b/0x120 [ 1285.071378] 0 [ 1285.074547] __do_page_fault+0xc8b/0x17e0 [ 1285.079332] 0 [ 1285.081166] do_page_fault+0x98/0xd0 [ 1285.085280] 0 [ 1285.087085] ? page_fault+0x8/0x30 [ 1285.090770] 0 [ 1285.092570] page_fault+0x1e/0x30 [ 1285.097888] RIP: 0033:0x43e6c1 [ 1285.101321] Node 0 [ 1285.104505] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 1285.104509] DMA: 0*4kB [ 1285.106763] RSP: 002b:0000000000a3fc18 EFLAGS: 00010202 [ 1285.125649] 0*8kB [ 1285.133572] 0*16kB [ 1285.135707] RAX: 00000000200005c0 RBX: fffffffffffffffe RCX: 000000000000736e [ 1285.135724] 1*32kB [ 1285.137955] RDX: 000000000000000a RSI: 0000000000730080 RDI: 00000000200005c0 [ 1285.145205] (U) [ 1285.147437] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000001 [ 1285.154702] 2*64kB [ 1285.156672] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1285.163929] (U) [ 1285.166158] R13: 00000000009300ac R14: 0000000000139ad8 R15: 0000000000139aab [ 1285.173416] 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1285.191344] Node 0 DMA32: 5126*4kB (UME) 5555*8kB (UM) 5274*16kB (UM) 1798*32kB (UME) 386*64kB (UME) 51*128kB (UME) 24*256kB (UM) 16*512kB (UM) 14*1024kB (UME) 1*2048kB (M) 0*4096kB = 268816kB [ 1285.208796] Node 0 Normal: 2946*4kB (UME) 2622*8kB (ME) 685*16kB (UME) 149*32kB (UME) 24*64kB (UM) 8*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51560kB [ 1285.224069] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 17:54:20 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1285.232657] 3147 total pagecache pages [ 1285.236565] 0 pages in swap cache [ 1285.240028] Swap cache stats: add 0, delete 0, find 0/0 [ 1285.245390] Free swap = 0kB [ 1285.248405] Total swap = 0kB [ 1285.251460] 1965979 pages RAM [ 1285.254565] 0 pages HighMem/MovableOnly [ 1285.258544] 102442 pages reserved 17:54:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000440)={0xfffffffffffffffd, 0x80000001, 0x6, 0x40, 0x4, 0x3, 0x3, 0x5, 0x4, 0x8, 0x9, 0x7}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)}}, 0xff8d) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) socketpair(0xe, 0x4, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000500)={0x9, 0x8, 0x8, 'queue1\x00', 0x8}) r2 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440), 0x111}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 2: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 0: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:20 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:21 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(r0, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 2: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e22}}, 0xffffffffffffff7f}, &(0x7f0000000500)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000540)={r1, 0x2, 0x30, 0x9, 0xba9a}, &(0x7f0000000580)=0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 0: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:21 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1286.988420] audit: type=1326 audit(1537379662.000:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6205 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:22 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:22 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) signalfd(r0, &(0x7f0000000440)={0x6}, 0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) write$FUSE_STATFS(r1, &(0x7f0000000480)={0x60, 0xffffffffffffffff, 0x4, {{0xc6ab, 0x6, 0x5, 0x3, 0x8001, 0xfca, 0x2, 0x100000000}}}, 0x60) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000500)={0x0, 0x1, 0x30}, &(0x7f0000000540)=0xc) 17:54:22 executing program 2: getpgid(0xffffffffffffffff) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) socket$inet6_sctp(0xa, 0x5, 0x84) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000200)={0x5, 0xfffffffffffffea4, 0xfa00, {&(0x7f0000000800), r0}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f0000000440)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000004c0)="42805da0ad5252ef84dc0f01eece67f3406e660c54f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f660f7f9e2d6700002e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:22 executing program 0: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:22 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000440)="7c42805da0adad52ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c3366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e9e5d5da3b744dbe266440f2eb6f19ea5e30721") [ 1287.984391] audit: type=1326 audit(1537379662.991:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6229 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:23 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:23 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:23 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0)={0x0}, &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) write$cgroup_pid(r1, &(0x7f00000004c0)=r0, 0x12) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0xc0000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000480)={'\x00', 0x2801}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:23 executing program 0: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:23 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1288.916114] audit: type=1326 audit(1537379663.927:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6250 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:24 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:24 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:24 executing program 3: syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000480)=0xfffffffffffffce0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') r1 = dup2(r0, r0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x1ff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0xfffffd2d, 0xfa00, {0x3, &(0x7f0000000500)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:24 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:24 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:25 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:25 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:25 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f00000005c0)='ns/cgroup\x00') waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:25 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:25 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0)={0x0}, &(0x7f00000007c0)=0x539) waitid(0x3, r0, &(0x7f0000000440), 0x8, &(0x7f0000000480)) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x8040800) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:25 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:25 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:26 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:26 executing program 2: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:26 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:26 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) munlockall() setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:26 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:27 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:27 executing program 2: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:27 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:27 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}, 0x2}}}, &(0x7f0000000500)=0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000540)=@assoc_value={r1, 0x3}, 0x8) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 17:54:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 17:54:28 executing program 2: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x80000000, 0x8}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)={r1, 0x7d, "d827223149778079e260422324228d55b7ec5b377140fc2016920d7344c14739e579386e136dcfea1aafdac074ec32ac5440b28768577410b324ce2e008cb0ff3d8816236170aa975db3a3aee20544590ca5abc830f67a6d391954e051a0343c419624e56b73be08b5fb0a7c1f07e93df921161efd517b68e67dd42fb9"}, &(0x7f0000000580)=0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) fcntl$lock(r0, 0x7, &(0x7f00000005c0)={0x2, 0x0, 0x3, 0x2, r2}) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:28 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 3: socket$inet6(0xa, 0x0, 0xdd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x6, 0x10000) write$uinput_user_dev(r0, &(0x7f0000000b00)={'syz0\x00', {0x1f, 0x9, 0x7}, 0x3c, [0x5, 0x6, 0x40000000000, 0x2, 0x6, 0x5, 0x6, 0xad0e, 0x7, 0xfff, 0x9, 0xffffffff80000000, 0x200, 0x8000, 0x6, 0x0, 0x9, 0x2, 0x3, 0x81, 0x1, 0xfffffffffffffffd, 0x200, 0x1, 0x0, 0x5, 0x7ff, 0x1f, 0x1f, 0x3, 0x298235f, 0x401, 0x2, 0x0, 0x4, 0xfff, 0x0, 0x0, 0x6, 0x10001, 0x5, 0x7, 0x6, 0x7, 0x5, 0x0, 0x7, 0x6, 0x24, 0x8, 0xff, 0xfffffffffffffffb, 0xb0, 0x40, 0x2, 0x7ff, 0x10001, 0x0, 0x0, 0x3, 0x9, 0xe1, 0x4, 0x4e2], [0x8, 0x74, 0x8000, 0x401, 0x7fff, 0x5, 0x9, 0x100, 0x4, 0x2, 0x8, 0x9, 0x5, 0xfffffffffffffffc, 0x6, 0x0, 0x400, 0x8, 0x7000000000000000, 0x3, 0xfffffffffffffbb8, 0x10000000000000, 0x7ff, 0x7fff, 0x8001, 0x80000000, 0x6, 0x6764, 0x3f, 0x7, 0x1, 0x9, 0x90000000, 0x7fff, 0x8, 0x8, 0x8, 0x6, 0xffffffffffffffff, 0x0, 0x100000001, 0x1, 0x1, 0x8, 0xfff, 0x9, 0x0, 0x8000, 0x8, 0x20, 0x8, 0x2, 0x7ff, 0x66f, 0x3, 0x6, 0x200, 0xf225, 0x1, 0x9, 0x3f, 0x5, 0x203f, 0x3], [0x1c4, 0xffff, 0xff, 0x9, 0x7fffffff, 0x6, 0x6860, 0x2f, 0x8, 0x7553, 0x9, 0x5, 0x3, 0x4, 0x1ff, 0x7, 0x6, 0x0, 0x10000, 0x7, 0x101, 0x3, 0x74, 0x7, 0xb4, 0x9, 0xcece, 0x400, 0x10001, 0xd, 0x101, 0xd0, 0x2, 0xfffffffffffff7d8, 0x1, 0x7, 0x0, 0x455, 0x26, 0x6, 0x1, 0x3ff, 0xf2, 0x1, 0x6, 0x7, 0x81, 0x7, 0x7ff, 0xff, 0x4, 0x261, 0x9, 0x8001, 0x9, 0x3, 0x0, 0x6, 0x6, 0x3, 0x8, 0xfff, 0x2, 0x3], [0x7, 0xfffffffffffffffa, 0x6, 0x10000, 0x8, 0x8, 0x0, 0x6, 0x6, 0x1, 0x9, 0xc5d, 0x7fffffff, 0x2, 0x5, 0x7, 0x35, 0x2, 0x80000000, 0x4, 0x7, 0x5b19f8e4, 0xf3, 0x3, 0x100000001, 0x8, 0x7fffffff, 0x7fff, 0x0, 0x7f, 0x100, 0x9, 0x10001, 0x9, 0xe6a, 0x100000000, 0xff, 0x20, 0x0, 0x8, 0x7fff, 0x1, 0x9, 0xfffffffffffffff7, 0x742, 0x0, 0x8, 0xd7, 0x6, 0xfffffffffffffffa, 0x4, 0xe72f, 0x7, 0x5, 0x8, 0x8, 0x7, 0x5, 0x5, 0x6, 0x20, 0x4, 0x2, 0x369]}, 0x45c) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000600)={0x0, 0xf, "a605c663598fc4a44b2b3b24756e7e"}, &(0x7f0000000640)=0x17) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000480)={r1, 0x2}, &(0x7f00000004c0)=0x8) r3 = pkey_alloc(0x0, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000840)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x21014}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="00033dbd7000fedbdf250e5d000009080004003b1162"], 0x1c}, 0x1, 0x0, 0x0, 0x4084}, 0x2d07e44e7f9ffa2b) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r3) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000500)={r2, @in6={{0xa, 0x4e22, 0x1, @loopback, 0xa54}}}, &(0x7f00000005c0)=0x84) seccomp(0x1, 0x2003, &(0x7f0000000880)={0x1a3, &(0x7f00000008c0)}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) r0 = dup(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0xff) mkdir(&(0x7f0000000480)='./file0\x00', 0x1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000004c0)=0x4) signalfd4(r1, &(0x7f0000000440), 0x8, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:28 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:29 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:29 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:29 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000007c0)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000440)=0x3) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:29 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:29 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:29 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:29 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:30 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000004c0)=0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:30 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:30 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:30 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x0, 0x8000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000004c0), r0}}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:30 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1295.403915] audit: type=1326 audit(1537379670.415:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6430 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:31 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x10000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x2000000000}}, 0x20) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'irlan0\x00'}, 0x18) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x20180) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0xffffffffffffff9b, 0xfa00, {&(0x7f0000000800), 0xffffffffffffffff, 0x1}}, 0xfffffffffffffe5a) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:31 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:31 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:31 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1296.349849] audit: type=1326 audit(1537379671.361:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6451 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:31 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:31 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:32 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") sendmsg$nl_route_sched(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="80000000310004002bbd7000180001001400040000000c000100766c616e000000007e52a42901001000040000000800010078740000000010000100000008000300010000000000100004000000080003000600000000001000140000000800030020000000080003000900000000000000000000000000"], 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x4c054) 17:54:32 executing program 2: r0 = getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, r0, &(0x7f0000000740), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:32 executing program 0: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1297.318113] audit: type=1326 audit(1537379672.329:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6472 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:32 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="5c008000", @ANYRES16=r1, @ANYBLOB="0c0429bd7000fbdbdf250900000040000300140006000000000000000000000000000000000008000400ff7f0000080007004e20000008000400000000000800030004000000080007004e240000080006001a970000"], 0x5c}, 0x1, 0x0, 0x0, 0x51}, 0x4000) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:32 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0xffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:32 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:33 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getsockname(r0, &(0x7f0000000680)=@ax25, &(0x7f0000000780)=0x80) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80810}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[@ANYBLOB="10010000", @ANYRES16=r1, @ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) 17:54:33 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x80000000, 0x8}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)={r1, 0x7d, "d827223149778079e260422324228d55b7ec5b377140fc2016920d7344c14739e579386e136dcfea1aafdac074ec32ac5440b28768577410b324ce2e008cb0ff3d8816236170aa975db3a3aee20544590ca5abc830f67a6d391954e051a0343c419624e56b73be08b5fb0a7c1f07e93df921161efd517b68e67dd42fb9"}, &(0x7f0000000580)=0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) fcntl$lock(r0, 0x7, &(0x7f00000005c0)={0x2, 0x0, 0x3, 0x2, r2}) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:33 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:33 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0xffffffb8) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e23, 0x7, @local, 0x6}, {0xa, 0x4e20, 0x3, @remote, 0x283e5ba180}, 0x3, [0x2, 0x100000000, 0x5, 0x1, 0xfff, 0x3ff, 0xb14b, 0x1]}, 0x5c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x5, 0x10, "03e11d7d28739585e166ba36902ce4acb81b6b43a36d16480e3e76f185ad6e8b4ba33f016b0c55fffdec215dbd5fb452b5a785c1325d466eb62aea1af69aba43", "4da96358479eea8ee20dd503e86d32cc211fb97112e9111346e183b37f73f656", [0x0, 0xff]}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000004c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:33 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:34 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000004c0)=0xc) r0 = creat(&(0x7f0000000440)='./file0\x00', 0x1fe) clock_gettime(0x3, &(0x7f0000000640)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000005c0)={&(0x7f0000000480), 0x10, &(0x7f0000000580)={&(0x7f0000000500)={0x0, 0x4, 0x3f, {r1, r2/1000+30000}, {0x0, 0x2710}, {0x2, 0x8000, 0x3, 0x4}, 0x1, @can={{0x1, 0xfffffffffffffffd, 0x4, 0x1}, 0x0, 0x1, 0x0, 0x0, "82a0145707cc5f29"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r3, 0xffffffffffffffff}}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000680)="42805da08d5252efc40241dd0048ce67f3406e660c541af3f001768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:34 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:34 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:34 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:34 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:35 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) fcntl$getown(r0, 0x9) r1 = dup2(r0, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r2}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@ipv6_delroute={0x2c, 0x19, 0x200, 0x70bd2d, 0x25dfdbfb, {0xa, 0x80, 0x20, 0xea3, 0xff, 0x0, 0xfe, 0x1, 0x200}, [@RTA_EXPIRES={0x8, 0x10, 0x1fa}, @RTA_MARK={0x8, 0x10, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040000}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:35 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:35 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000800)=[@in6={0xa, 0x4e24, 0x8, @mcast1, 0x1ff}, @in6={0xa, 0x4e22, 0x47c9, @ipv4={[], [], @rand_addr=0x7}, 0x6}, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0x7}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x6}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x1}, @in6={0xa, 0x4e23, 0x1f, @ipv4={[], [], @multicast1}, 0x10001}], 0xfffffffffffffdc8) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x20f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:35 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:35 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:35 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xfffffffffffffd07) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0)={0x0}, &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) prlimit64(r0, 0xf, &(0x7f0000000680)={0xb8, 0x4}, &(0x7f00000006c0)) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000800)={0x5, 0xffff, 0x3f, 0x20, 0xed, 0x7, 0x3, 0x0, 0x6, 0x3, 0x81, 0x101}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000640)={0x1, 0x1, &(0x7f0000000440)=""/48, &(0x7f0000000480)=""/160, &(0x7f0000000540)=""/222, 0x2}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0xfd, 0x40) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @mcast2, 0x9}, r2}}, 0x30) ioctl$KDENABIO(r1, 0x4b36) creat(&(0x7f0000000440)='./file0\x00', 0x4) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f00000004c0)="64acbf51246fad653e9b282b4f4bd8952a81393d958de00340dc0e746797", 0x1e) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:36 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:36 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:36 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') uname(&(0x7f0000000440)=""/96) unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="08000900b8ff01000004a705040000000400f9d735dc2e82f329b906857dd30bd212304000"], &(0x7f0000000500)=0x1a) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000540)={r1, 0x100000000}, &(0x7f0000000580)=0x8) 17:54:37 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:37 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0xffffffffffefffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:37 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:37 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1302.931835] audit: type=1326 audit(1537379677.943:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6621 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:38 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0x539) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) sendmmsg$unix(r7, &(0x7f0000001c40)=[{&(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000640)="ece55e36e6f153ee88deb9d85d6513380208f2abb3c0738487b6fb11f00d094eda471482556155b28b535c61a8867704785d17f650720e7766eb806b39f75fe8594fc5d0b43fda0e23af6040a9ede97709f25c77d65da512ced6d78187", 0x5d}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000800)="b73321ea67ba67c5e0e3acc089a0ed5e463adae7ab7dcf666060f6b72d4dcd83cafd7273c00b1d36dfef92980ec1b9f6d990775dc571e8325dd998707614bfeb5fa57ba8b84237e82d78e0e4f1d32f8ebcc6fba80dbde895bd7cd161d1c929017d1534f005223ae7d6dfca03c36a53d28e0ec906e418622bedc8e1b0be9401db71f7c75aa5bb78e4f3b48e4f4f0d85ed7dd9df5f1821fc3bb7df508b7407177debb4b96cdef590e3f201b7f10596c95fce8adedbf0a84203bace6e83f52dd2992be5e3e71c92aebe493ae69c1df78d97", 0xd0}, {&(0x7f00000006c0)="ccd77e330771cdba5ad33ae7b7dd51698ef6e564977aaf8db8", 0x19}], 0x4, &(0x7f0000000940)=[@rights={0x20, 0x1, 0x1, [r6, r6, r6, r7]}, @rights={0x18, 0x1, 0x1, [r7, r6]}, @rights={0x28, 0x1, 0x1, [r6, r6, r7, r6, r6]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x80}, {&(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000a40)="50acb4ab9519644553ac3cb4450d8d829faa6b", 0x13}, {&(0x7f0000001b00)="4976c58b1603717f19bfd0aa7163ed672e92f6d58e789904c6bc40928ee60546dd6baa6f2a3797b3705c05087114fd8282c950ca240485f19557294a499815914bafc28fa211223ce97315cf7434a463a723c3fc5257510251f97ff2044ce8ce55d00fdd0decffc6b7e7ea6abf05958debac53d4c98444d437bbc59832041cec02f876634657f268c419cd15bccd4caadebe5cc59d279a8b184ac56b2b3108a46983228f2e0b5ff994b130c6731529a00192580a9ef0d6c95d1f8ecee527d06401408e64dc6f1d4e9909c48dfbc4b31f437e1ff840c4b11551031031551db4985995794d569fdd1d6b4333210c13ac", 0xef}], 0x2, &(0x7f0000001c00)=[@cred={0x20, 0x1, 0x2, r0, r1, r2}], 0x20, 0x4000}], 0x2, 0x20040800) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000440)={0x0, 0x8, 0x6, [0x7, 0x1c4, 0x100, 0x6, 0x2, 0x7fffffff]}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f00000004c0)={r8, @in={{0x2, 0x4e20, @multicast2}}, 0x71be, 0xff, 0x1, 0x0, 0x7}, &(0x7f0000000580)=0x98) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:38 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) rt_sigqueueinfo(r0, 0xf, &(0x7f0000000440)={0x28, 0x1ff, 0xf, 0x5}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:38 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:38 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1303.904478] audit: type=1326 audit(1537379678.916:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6648 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:39 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:39 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:39 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:39 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:39 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(r0, 0x0, 0x6, 0x2) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000480)={0x8, 0x120, 0xfa00, {0x4, {0x401, 0x4b, "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", 0xdc, 0xaab, 0x7f, 0x6, 0x40, 0xffff, 0x6}, r2}}, 0x128) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:39 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:39 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:39 executing program 2: getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') unshare(0x0) waitid(0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000700)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1304.857760] audit: type=1326 audit(1537379679.869:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6679 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:40 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:40 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0xff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x299, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) ptrace$cont(0x3f, r0, 0xfff, 0x224a000000000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) r3 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x7000) shmdt(r3) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r2, 0x4}}, 0xffffffffffffff35) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000004c0)={0x0, 0x9}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000540)={r4, 0x1, 0x400}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000680)={r4, 0xffff}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") pipe2(&(0x7f0000000640), 0x0) 17:54:40 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:40 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:41 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:41 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x404000004) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000440)=0xca, 0x4) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:41 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:41 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(r0, &(0x7f0000000480)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000500)={0x0, @multicast1, @loopback}, &(0x7f0000000540)=0xc) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000580)={r2, 0x1, 0x6, @remote}, 0x10) 17:54:41 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:42 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:42 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:42 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:42 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:42 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) bind$can_raw(r0, &(0x7f00000005c0)={0x1d, r1}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000440)={0x11, 0x5, 0xf, 0x5, 0x8, 0xc566, 0x1, 0x7f, 0x1}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:43 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:43 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x9effffff, 0x8100000000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffff000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:43 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:43 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREAD(r0, &(0x7f0000000440)={0xeb, 0x75, 0x2, {0xe0, "30ce4a9f2b5f7d707976088d9970b756217ab5bb726979decb8b5e46b9f33f9decf2a0f15f5db0c1983096004717ea87305523fb6a28cf2785d775cee1fd1614468f9a7d5b9d1458e57cab2bdbc0b39f677b5d9e99e2a483390b7a3e014711db24276fd3cccbb823867a41f9f09d1706ff981db06a5dca0726650fbcfe5adb23d9e217605a805586750e4374df14e75e9de264085a26424ab6e85c0bf21ffc518c461b32ed0b3add6240c38f63439c213d49de559477f51b5b007b1c0f24be960ae99d89bb6a1364d2614f8e3218954ac2269cfe98ec0c3a4e52633bbbd40808"}}, 0xeb) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) [ 1308.581814] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:54:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) 17:54:44 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 1309.392117] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:54:44 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:44 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r2, &(0x7f0000000800)={0xa, 0x4e20, 0x8d2a, @loopback, 0xff}, 0x1c) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000840)=@dstopts={0x0, 0x1, [], [@jumbo={0xc2, 0x4, 0xffffffff}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}, 0x18) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500), 0x106, 0x100a}}, 0x20) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x1f2, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}}}, 0xfffffffffffffcf6) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000440), 0x2) ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000b00)=""/4096) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000004c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xdec, @mcast1, 0x3}, r5}}, 0x30) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0xb6, 0xffffffffffffff68, 0x200, 0x3, 0x54}, &(0x7f0000000640)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000680)={r6, 0x7, 0xb92}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0xa0840) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$RTC_AIE_OFF(r4, 0x7002) setgroups(0x2, &(0x7f0000000040)=[r0, r0]) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:44 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000480)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:45 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:45 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:45 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:45 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:45 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x2, 0x2080) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000480)={0x5, 0x7fffffff, 0x8000}) unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:45 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4080, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xfffffffffffffdb8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x400000000000, &(0x7f0000000480)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000440)={0x7, 0x9}) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x2ca) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:45 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:46 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:46 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:46 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:46 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) lstat(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:46 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r3, 0x9}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:47 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:47 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:47 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10000010) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:47 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/mnt\x00') unshare(0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00'}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000180), 0x4) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x6, 0x3, 0x1}) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:48 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:48 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:48 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:48 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:48 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r1 = dup2(r0, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000600)=[@in={0x2, 0x4e23, @rand_addr}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0x80f4, @mcast1, 0x9}, @in6={0xa, 0x4e22, 0xfffffffffffffffc, @mcast1, 0x3}], 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:48 executing program 1: personality(0x400000f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x1, 0x280) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x40, @remote, 0x1}, {0xa, 0x4e22, 0x4, @mcast1, 0x100000000}, r1, 0x7}}, 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:49 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:49 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:49 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 17:54:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) pipe(&(0x7f0000000200)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1314.834477] audit: type=1326 audit(1537379689.846:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6919 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 17:54:49 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') openat$userio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/userio\x00', 0x800, 0x0) unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:50 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0xb7, "2d2eee9bb54645b0ec1db6a43686c32e399da34ee9ccff517005de75790091bb26ea783388fad133147c83d28b7802bc75bb074d600d3635907fad197736fa86dd170abe94d3bb7dfa3fe721fa96a26bbd33ea7ff7069ca662365ec7afb0761fa566939faba0bee58e468bc260cac647f3f818fcddc0c991745e89a2d4fca0d34fcca64d15706f44d17d8c442a208f2ea262725d94c796f7d7618c21952af8fa0f6348e1adf9357f9cdfea84e1c55ae9c4494b767321b0"}, &(0x7f0000000500)=0xbf) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:50 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f00000007c0)=0x539) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80000000, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @empty, 0x10001}, r1}}, 0x48) unshare(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x8000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x410005, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000009c0), 0x0) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 17:54:50 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000008c0)=""/209) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0xfffffffffffffd54) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=ANY=[], 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/122, &(0x7f0000000140)=0x7a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002dc0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xfffffffffffffcd9) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000280)) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/cgroup\x00') fstat(0xffffffffffffffff, &(0x7f0000000840)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@local, @in=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000003080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000640)) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='Ys/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000003180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 1328.131176] khugepaged: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1328.141468] khugepaged cpuset=/ mems_allowed=0 [ 1328.146102] CPU: 1 PID: 721 Comm: khugepaged Not tainted 4.19.0-rc4+ #50 [ 1328.152945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.162302] Call Trace: [ 1328.164909] dump_stack+0x14b/0x190 [ 1328.168571] warn_alloc+0x472/0x690 [ 1328.172263] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1328.177112] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1328.182659] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1328.188412] ? kmsan_set_origin_inline+0x6b/0x120 [ 1328.193274] ? __msan_poison_alloca+0x173/0x1f0 [ 1328.197964] ? compaction_defer_reset+0x5e/0x390 [ 1328.202758] ? __alloc_pages_direct_compact+0x3bd/0x4e0 [ 1328.208140] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1328.213520] ? compaction_defer_reset+0x30e/0x390 [ 1328.218395] ? __alloc_pages_direct_compact+0x3bd/0x4e0 [ 1328.223789] kmsan_alloc_page+0x75/0xd0 [ 1328.227779] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1328.232553] ? update_cfs_rq_load_avg+0x5df/0xa00 [ 1328.237443] ? kmsan_set_origin_inline+0x6b/0x120 [ 1328.242331] ? __msan_poison_alloca+0x173/0x1f0 [ 1328.247049] khugepaged_scan_mm_slot+0x29f5/0xeba0 [ 1328.251999] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1328.257487] ? kmsan_set_origin_inline+0x6b/0x120 [ 1328.262357] ? kmsan_set_origin_inline+0x6b/0x120 [ 1328.267211] ? __msan_poison_alloca+0x173/0x1f0 [ 1328.271912] ? try_to_del_timer_sync+0x179/0x880 [ 1328.276704] ? __msan_poison_alloca+0x173/0x1f0 [ 1328.281404] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 1328.287232] ? rcu_all_qs+0x2e/0x1f0 [ 1328.290987] khugepaged+0x82c/0x1790 [ 1328.294742] ? init_wait_entry+0x190/0x190 [ 1328.299008] kthread+0x465/0x4a0 [ 1328.302385] ? start_stop_khugepaged+0x790/0x790 [ 1328.307186] ? kthread_blkcg+0xf0/0xf0 [ 1328.311092] ret_from_fork+0x35/0x40 [ 1328.314829] warn_alloc_show_mem: 1 callbacks suppressed [ 1328.314835] Mem-Info: [ 1328.322656] active_anon:275036 inactive_anon:110 isolated_anon:28 [ 1328.322656] active_file:2564 inactive_file:2857 isolated_file:0 [ 1328.322656] unevictable:0 dirty:30 writeback:0 unstable:0 [ 1328.322656] slab_reclaimable:3341 slab_unreclaimable:9251 [ 1328.322656] mapped:53142 shmem:116 pagetables:1201 bounce:0 [ 1328.322656] free:101360 free_pcp:3 free_cma:0 [ 1328.355970] Node 0 active_anon:1100144kB inactive_anon:440kB active_file:10256kB inactive_file:11428kB unevictable:0kB isolated(anon):112kB isolated(file):0kB mapped:212568kB dirty:120kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 86016kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1328.384262] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1328.410427] lowmem_reserve[]: 0 2833 7259 7259 [ 1328.415068] Node 0 DMA32 free:243660kB min:26324kB low:32904kB high:39484kB active_anon:589868kB inactive_anon:16kB active_file:4580kB inactive_file:7352kB unevictable:0kB writepending:44kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1216kB pagetables:1736kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1328.444018] lowmem_reserve[]: 0 0 4425 4425 [ 1328.448404] Node 0 Normal free:145876kB min:41112kB low:51388kB high:61664kB active_anon:510324kB inactive_anon:424kB active_file:5676kB inactive_file:4076kB unevictable:0kB writepending:76kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7872kB pagetables:3068kB bounce:0kB free_pcp:12kB local_pcp:12kB free_cma:0kB [ 1328.477697] lowmem_reserve[]: 0 0 0 0 [ 1328.481534] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1328.494885] Node 0 DMA32: 8822*4kB (UME) 5665*8kB (UM) 2806*16kB (UM) 1797*32kB (UME) 398*64kB (UME) 51*128kB (UME) 24*256kB (UM) 16*512kB (UM) 14*1024kB (UME) 0*2048kB 0*4096kB = 243680kB [ 1328.512021] Node 0 Normal: 15437*4kB (UME) 5366*8kB (UME) 1273*16kB (UME) 298*32kB (UME) 85*64kB (UME) 20*128kB (UM) 7*256kB (UM) 3*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 145908kB [ 1328.528535] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1328.537119] 5508 total pagecache pages [ 1328.541008] 0 pages in swap cache [ 1328.544472] Swap cache stats: add 0, delete 0, find 0/0 [ 1328.549836] Free swap = 0kB [ 1328.552856] Total swap = 0kB [ 1328.555880] 1965979 pages RAM [ 1328.558986] 0 pages HighMem/MovableOnly [ 1328.562959] 102442 pages reserved [ 1339.380896] khugepaged: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1339.391186] khugepaged cpuset=/ mems_allowed=0 [ 1339.395809] CPU: 1 PID: 721 Comm: khugepaged Not tainted 4.19.0-rc4+ #50 [ 1339.402647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.412003] Call Trace: [ 1339.414623] dump_stack+0x14b/0x190 [ 1339.418276] warn_alloc+0x472/0x690 [ 1339.421957] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1339.426849] ? kernel_poison_pages+0x1a0/0x360 [ 1339.431481] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1339.436862] ? update_load_avg+0x6c4/0x1a00 [ 1339.441236] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1339.447062] kmsan_alloc_page+0x75/0xd0 [ 1339.451055] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1339.455829] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1339.461208] ? __update_load_avg_cfs_rq+0x102/0x1070 [ 1339.466381] ? kmsan_set_origin_inline+0x6b/0x120 [ 1339.471266] ? __msan_poison_alloca+0x173/0x1f0 [ 1339.475955] ? rcu_all_qs+0x2e/0x1f0 [ 1339.479711] khugepaged_scan_mm_slot+0x29f5/0xeba0 [ 1339.484692] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1339.490185] ? pick_next_task_fair+0x22a8/0x24c0 [ 1339.494988] ? __msan_poison_alloca+0x173/0x1f0 [ 1339.499696] ? __switch_to+0x2b3/0x420 [ 1339.503607] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 1339.509452] ? rcu_all_qs+0x2e/0x1f0 [ 1339.513260] khugepaged+0x82c/0x1790 [ 1339.517003] ? init_wait_entry+0x190/0x190 [ 1339.521526] kthread+0x465/0x4a0 [ 1339.524938] ? start_stop_khugepaged+0x790/0x790 [ 1339.529733] ? kthread_blkcg+0xf0/0xf0 [ 1339.533652] ret_from_fork+0x35/0x40 [ 1339.537410] Mem-Info: [ 1339.539896] active_anon:274561 inactive_anon:110 isolated_anon:0 [ 1339.539896] active_file:2628 inactive_file:2594 isolated_file:0 [ 1339.539896] unevictable:0 dirty:9 writeback:0 unstable:0 [ 1339.539896] slab_reclaimable:3341 slab_unreclaimable:9251 [ 1339.539896] mapped:53043 shmem:116 pagetables:1201 bounce:0 [ 1339.539896] free:102453 free_pcp:762 free_cma:0 [ 1339.573235] Node 0 active_anon:1098244kB inactive_anon:440kB active_file:10512kB inactive_file:10376kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:212172kB dirty:36kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 86016kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1339.601295] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1339.627492] lowmem_reserve[]: 0 2833 7259 7259 [ 1339.632639] Node 0 DMA32 free:248912kB min:26324kB low:32904kB high:39484kB active_anon:585820kB inactive_anon:16kB active_file:4652kB inactive_file:6768kB unevictable:0kB writepending:8kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1152kB pagetables:1736kB bounce:0kB free_pcp:1600kB local_pcp:1404kB free_cma:0kB [ 1339.662049] lowmem_reserve[]: 0 0 4425 4425 [ 1339.666452] Node 0 Normal free:144996kB min:41112kB low:51388kB high:61664kB active_anon:512464kB inactive_anon:424kB active_file:5860kB inactive_file:3608kB unevictable:0kB writepending:28kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7680kB pagetables:3068kB bounce:0kB free_pcp:1448kB local_pcp:672kB free_cma:0kB [ 1339.696282] lowmem_reserve[]: 0 0 0 0 [ 1339.700161] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1339.713543] Node 0 DMA32: 9024*4kB (UME) 5708*8kB (UM) 2831*16kB (UM) 1820*32kB (UME) 416*64kB (UME) 63*128kB (UME) 25*256kB (UM) 16*512kB (UM) 14*1024kB (UME) 0*2048kB 0*4096kB = 248912kB [ 1339.730686] Node 0 Normal: 15059*4kB (UME) 5369*8kB (UME) 1273*16kB (UME) 298*32kB (UME) 92*64kB (UME) 21*128kB (UM) 7*256kB (UM) 3*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 144996kB [ 1339.747479] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1339.756098] 5338 total pagecache pages [ 1339.760014] 0 pages in swap cache [ 1339.763524] Swap cache stats: add 0, delete 0, find 0/0 [ 1339.769364] Free swap = 0kB [ 1339.772419] Total swap = 0kB [ 1339.775487] 1965979 pages RAM [ 1339.778610] 0 pages HighMem/MovableOnly [ 1339.782619] 102442 pages reserved [ 1340.798605] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1340.809188] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1340.814394] CPU: 0 PID: 6976 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1340.821659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.831078] Call Trace: [ 1340.833760] dump_stack+0x14b/0x190 [ 1340.837516] warn_alloc+0x472/0x690 [ 1340.841290] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1340.846221] ? kernel_poison_pages+0x1a0/0x360 [ 1340.850881] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1340.856454] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1340.862278] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1340.867846] kmsan_alloc_page+0x75/0xd0 [ 1340.871904] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1340.876726] ? kmsan_set_origin_inline+0x6b/0x120 [ 1340.881624] ? __msan_poison_alloca+0x173/0x1f0 [ 1340.886327] ? should_fail+0x53/0xaa0 [ 1340.890152] ? __should_failslab+0x278/0x2a0 [ 1340.894574] ? kmsan_set_origin_inline+0x6b/0x120 [ 1340.899486] alloc_pages_vma+0x1578/0x1830 [ 1340.903768] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1340.908889] ? kmsan_set_origin_inline+0x6b/0x120 [ 1340.913768] handle_mm_fault+0x4377/0x81b0 [ 1340.918012] ? kmsan_set_origin_inline+0x6b/0x120 [ 1340.922903] __do_page_fault+0xc8b/0x17e0 [ 1340.927107] do_page_fault+0x98/0xd0 [ 1340.930855] ? page_fault+0x8/0x30 [ 1340.934405] page_fault+0x1e/0x30 [ 1340.937876] RIP: 0033:0x40052d [ 1340.941084] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1340.960005] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1340.965420] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1340.972692] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1340.979977] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000000 [ 1340.987283] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1340.994614] R13: 00000000009300ac R14: 00000000001475b7 R15: 000000000014758a [ 1341.001949] Mem-Info: [ 1341.004484] active_anon:274529 inactive_anon:110 isolated_anon:0 [ 1341.004484] active_file:2501 inactive_file:2710 isolated_file:32 [ 1341.004484] unevictable:0 dirty:15 writeback:0 unstable:0 [ 1341.004484] slab_reclaimable:3341 slab_unreclaimable:9251 [ 1341.004484] mapped:53043 shmem:116 pagetables:1201 bounce:0 [ 1341.004484] free:102389 free_pcp:732 free_cma:0 [ 1341.038242] Node 0 active_anon:1098116kB inactive_anon:440kB active_file:10004kB inactive_file:10840kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:212172kB dirty:60kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1341.066513] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1341.092734] lowmem_reserve[]: 0 2833 7259 7259 [ 1341.097419] Node 0 DMA32 free:248912kB min:26324kB low:32904kB high:39484kB active_anon:585772kB inactive_anon:16kB active_file:4652kB inactive_file:6768kB unevictable:0kB writepending:8kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1152kB pagetables:1736kB bounce:0kB free_pcp:1636kB local_pcp:196kB free_cma:0kB [ 1341.126771] lowmem_reserve[]: 0 0 4425 4425 [ 1341.131169] Node 0 Normal free:144740kB min:41112kB low:51388kB high:61664kB active_anon:512344kB inactive_anon:424kB active_file:5860kB inactive_file:3608kB unevictable:0kB writepending:52kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7808kB pagetables:3068kB bounce:0kB free_pcp:1292kB local_pcp:992kB free_cma:0kB [ 1341.160762] lowmem_reserve[]: 0 0 0 0 [ 1341.164670] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1341.178127] Node 0 DMA32: 9024*4kB (UME) 5708*8kB (UM) 2831*16kB (UM) 1820*32kB (UME) 416*64kB (UME) 63*128kB (UME) 25*256kB (UM) 16*512kB (UM) 14*1024kB (UME) 0*2048kB 0*4096kB = 248912kB [ 1341.195302] Node 0 Normal: 15059*4kB (UME) 5366*8kB (UME) 1273*16kB (UME) 298*32kB (UME) 86*64kB (UME) 21*128kB (UM) 7*256kB (UM) 3*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 144588kB [ 1341.211690] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1341.220253] 5341 total pagecache pages [ 1341.224127] 0 pages in swap cache [ 1341.227575] Swap cache stats: add 0, delete 0, find 0/0 [ 1341.232938] Free swap = 0kB [ 1341.235975] Total swap = 0kB [ 1341.238992] 1965979 pages RAM [ 1341.242092] 0 pages HighMem/MovableOnly [ 1341.246055] 102442 pages reserved [ 1344.023990] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1344.034517] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1344.039648] CPU: 0 PID: 6981 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1344.046830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.056185] Call Trace: [ 1344.058788] dump_stack+0x14b/0x190 [ 1344.062436] warn_alloc+0x472/0x690 [ 1344.066120] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1344.070989] ? kernel_poison_pages+0x1a0/0x360 [ 1344.075595] ? kernel_poison_pages+0x1a0/0x360 [ 1344.080236] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1344.086009] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1344.091520] kmsan_alloc_page+0x75/0xd0 [ 1344.095516] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1344.100297] ? kmsan_set_origin_inline+0x6b/0x120 [ 1344.105145] ? __msan_poison_alloca+0x173/0x1f0 [ 1344.109820] ? should_fail+0x53/0xaa0 [ 1344.113621] ? __should_failslab+0x278/0x2a0 [ 1344.118040] ? kmsan_set_origin_inline+0x6b/0x120 [ 1344.122982] alloc_pages_vma+0x1578/0x1830 [ 1344.127263] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1344.132382] ? kmsan_set_origin_inline+0x6b/0x120 [ 1344.137269] handle_mm_fault+0x4377/0x81b0 [ 1344.141513] ? kmsan_set_origin_inline+0x6b/0x120 [ 1344.146400] __do_page_fault+0xc8b/0x17e0 [ 1344.150600] do_page_fault+0x98/0xd0 [ 1344.154344] ? page_fault+0x8/0x30 [ 1344.157896] page_fault+0x1e/0x30 [ 1344.161353] RIP: 0033:0x40052d [ 1344.164550] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1344.183460] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1344.188844] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1344.196120] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1344.203391] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.210664] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1344.217934] R13: 00000000009300ac R14: 0000000000148251 R15: 0000000000148224 [ 1344.225230] Mem-Info: [ 1344.227705] active_anon:274529 inactive_anon:110 isolated_anon:0 [ 1344.227705] active_file:2386 inactive_file:2759 isolated_file:0 [ 1344.227705] unevictable:0 dirty:9 writeback:0 unstable:0 [ 1344.227705] slab_reclaimable:3341 slab_unreclaimable:9251 [ 1344.227705] mapped:53043 shmem:116 pagetables:1223 bounce:0 [ 1344.227705] free:102304 free_pcp:724 free_cma:0 [ 1344.261054] Node 0 active_anon:1098116kB inactive_anon:440kB active_file:9544kB inactive_file:11036kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:212172kB dirty:36kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1344.289008] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1344.315166] lowmem_reserve[]: 0 2833 7259 7259 [ 1344.319776] Node 0 DMA32 free:248912kB min:26324kB low:32904kB high:39484kB active_anon:585772kB inactive_anon:16kB active_file:4468kB inactive_file:6884kB unevictable:0kB writepending:8kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1152kB pagetables:1736kB bounce:0kB free_pcp:1652kB local_pcp:196kB free_cma:0kB [ 1344.349051] lowmem_reserve[]: 0 0 4425 4425 [ 1344.353495] Node 0 Normal free:144400kB min:41112kB low:51388kB high:61664kB active_anon:512344kB inactive_anon:424kB active_file:5472kB inactive_file:4036kB unevictable:0kB writepending:28kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7808kB pagetables:3156kB bounce:0kB free_pcp:1244kB local_pcp:788kB free_cma:0kB [ 1344.383044] lowmem_reserve[]: 0 0 0 0 [ 1344.386866] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1344.400201] Node 0 DMA32: 9025*4kB (UME) 5709*8kB (UM) 2832*16kB (UM) 1823*32kB (UME) 416*64kB (UME) 62*128kB (UME) 26*256kB (UM) 16*512kB (UM) 14*1024kB (UME) 0*2048kB 0*4096kB = 249164kB [ 1344.417260] Node 0 Normal: 14996*4kB (UME) 5366*8kB (UME) 1273*16kB (UME) 298*32kB (UME) 86*64kB (UME) 21*128kB (UM) 7*256kB (UM) 3*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 144336kB [ 1344.433678] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1344.442251] 5303 total pagecache pages [ 1344.446140] 0 pages in swap cache [ 1344.449592] Swap cache stats: add 0, delete 0, find 0/0 [ 1344.454948] Free swap = 0kB [ 1344.457962] Total swap = 0kB [ 1344.460980] 1965979 pages RAM [ 1344.464080] 0 pages HighMem/MovableOnly [ 1344.468053] 102442 pages reserved [ 1347.167924] syz-executor1: page allocation failure: order:9, mode:0x1480020(GFP_ATOMIC|0x1000000), nodemask=(null) [ 1347.178477] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1347.183664] CPU: 0 PID: 6986 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #50 [ 1347.190855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.200208] Call Trace: [ 1347.202808] dump_stack+0x14b/0x190 [ 1347.206447] warn_alloc+0x472/0x690 [ 1347.210130] __alloc_pages_nodemask+0x5ae3/0x5c80 [ 1347.215008] ? kernel_poison_pages+0x1a0/0x360 [ 1347.219644] ? kernel_poison_pages+0x1a0/0x360 [ 1347.224315] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 1347.230048] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1347.235555] kmsan_alloc_page+0x75/0xd0 [ 1347.239547] __alloc_pages_nodemask+0xf6b/0x5c80 [ 1347.244324] ? kmsan_set_origin_inline+0x6b/0x120 [ 1347.249180] ? __msan_poison_alloca+0x173/0x1f0 [ 1347.253880] ? should_fail+0x53/0xaa0 [ 1347.257700] ? __should_failslab+0x278/0x2a0 [ 1347.262122] ? kmsan_set_origin_inline+0x6b/0x120 [ 1347.267026] alloc_pages_vma+0x1578/0x1830 [ 1347.271303] do_huge_pmd_anonymous_page+0xbce/0x27e0 [ 1347.276424] ? kmsan_set_origin_inline+0x6b/0x120 [ 1347.281291] handle_mm_fault+0x4377/0x81b0 [ 1347.285537] ? kmsan_set_origin_inline+0x6b/0x120 [ 1347.290424] __do_page_fault+0xc8b/0x17e0 [ 1347.294609] do_page_fault+0x98/0xd0 [ 1347.298354] ? page_fault+0x8/0x30 [ 1347.301903] page_fault+0x1e/0x30 [ 1347.305350] RIP: 0033:0x40052d [ 1347.308524] Code: 8a 4c 24 10 d3 e0 09 f0 48 8b 74 24 08 66 89 06 e9 fe 00 00 00 48 8b 44 24 10 48 0b 44 24 28 75 10 48 8b 44 24 08 8b 54 24 20 <89> 10 e9 e2 00 00 00 8a 4c 24 28 b8 01 00 00 00 48 8b 74 24 08 48 [ 1347.327409] RSP: 002b:0000000000a3fbe0 EFLAGS: 00010246 [ 1347.332768] RAX: 0000000020000740 RBX: fffffffffffffffe RCX: 0000000000000000 [ 1347.340040] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000001b1c848 [ 1347.347390] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000000 [ 1347.354665] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 1347.361918] R13: 00000000009300ac R14: 0000000000148e99 R15: 0000000000148e6c [ 1347.369201] Mem-Info: [ 1347.371625] active_anon:274569 inactive_anon:110 isolated_anon:14 [ 1347.371625] active_file:1875 inactive_file:2138 isolated_file:0 [ 1347.371625] unevictable:0 dirty:11 writeback:0 unstable:0 [ 1347.371625] slab_reclaimable:3341 slab_unreclaimable:9251 [ 1347.371625] mapped:52144 shmem:116 pagetables:1201 bounce:0 [ 1347.371625] free:104887 free_pcp:308 free_cma:0 [ 1347.405041] Node 0 active_anon:1098276kB inactive_anon:440kB active_file:7500kB inactive_file:8552kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:208576kB dirty:44kB writeback:0kB shmem:464kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1347.432968] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1347.459101] lowmem_reserve[]: 0 2833 7259 7259 [ 1347.463685] Node 0 DMA32 free:254456kB min:26324kB low:32904kB high:39484kB active_anon:585772kB inactive_anon:16kB active_file:3724kB inactive_file:4016kB unevictable:0kB writepending:4kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:1152kB pagetables:1736kB bounce:0kB free_pcp:196kB local_pcp:196kB free_cma:0kB [ 1347.492955] lowmem_reserve[]: 0 0 4425 4425 [ 1347.497316] Node 0 Normal free:149188kB min:41112kB low:51388kB high:61664kB active_anon:512504kB inactive_anon:424kB active_file:3560kB inactive_file:4284kB unevictable:0kB writepending:40kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:7808kB pagetables:3068kB bounce:0kB free_pcp:1036kB local_pcp:988kB free_cma:0kB [ 1347.527015] lowmem_reserve[]: 0 0 0 0 [ 1347.530817] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1347.544155] Node 0 DMA32: 9892*4kB (UME) 5692*8kB (UM) 2810*16kB (UM) 1801*32kB (UME) 403*64kB (UME) 53*128kB (UME) 26*256kB (UM) 18*512kB (UM) 16*1024kB (UME) 1*2048kB (M) 0*4096kB = 254576kB [ 1347.561510] Node 0 Normal: 15178*4kB (UME) 5330*8kB (UME) 1287*16kB (UME) 309*32kB (UME) 95*64kB (UME) 28*128kB (UM) 8*256kB (UM) 3*512kB (UM) 0*1024kB 1*2048kB (M) 0*4096kB = 149128kB [ 1347.578204] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1347.586783] 4157 total pagecache pages [ 1347.590680] 0 pages in swap cache [ 1347.594141] Swap cache stats: add 0, delete 0, find 0/0 [ 1347.599497] Free swap = 0kB [ 1347.602492] Total swap = 0kB [ 1347.605504] 1965979 pages RAM [ 1347.608602] 0 pages HighMem/MovableOnly [ 1347.612556] 102442 pages reserved 2018/09/19 17:55:26 executor 1 failed 11 times: wrong call 1 num 397/1476 [ 1353.277494] device bridge_slave_1 left promiscuous mode [ 1353.283642] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.505743] device bridge_slave_0 left promiscuous mode [ 1353.511540] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.610617] ------------[ cut here ]------------ [ 1353.615416] kernel BUG at mm/kmsan/kmsan_hooks.c:268! [ 1353.620750] invalid opcode: 0000 [#1] SMP PTI [ 1353.625298] CPU: 0 PID: 4262 Comm: syz-fuzzer Not tainted 4.19.0-rc4+ #50 [ 1353.632487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.641878] RIP: 0010:kmsan_free_page+0x281/0x2d0 [ 1353.646732] Code: 7d d0 83 c0 ff 41 89 85 f4 08 00 00 75 59 e8 06 80 49 ff 4c 89 7d c0 ff 75 c0 9d 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 [ 1353.665654] RSP: 0018:ffff8801b67af300 EFLAGS: 00010286 [ 1353.671036] RAX: 0000000000000038 RBX: ffffea00069f1550 RCX: 0000000000000009 [ 1353.678311] RDX: ffff8801ff814498 RSI: 0000000000000009 RDI: ffffea00069f0000 [ 1353.685581] RBP: ffff8801b67af348 R08: 0000000000480020 R09: 0000000000000002 [ 1353.692869] R10: 0000000000000000 R11: ffffffff81c47240 R12: 0000000000000200 [ 1353.700141] R13: 0000000000000009 R14: 0000000000000009 R15: ffff8801c8912680 [ 1353.707441] FS: 000000c420027c68(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 1353.715671] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.721552] CR2: 00000000017e5ea0 CR3: 0000000009c30000 CR4: 00000000001406f0 [ 1353.728821] Call Trace: [ 1353.731442] ? __free_pages_ok+0x6d/0x16c0 [ 1353.735683] ? free_compound_page+0x8b/0xc0 [ 1353.740021] __free_pages_ok+0x25a/0x16c0 [ 1353.744174] ? kmsan_set_origin_inline+0x6b/0x120 [ 1353.749024] ? __msan_poison_alloca+0x173/0x1f0 [ 1353.753704] free_compound_page+0x8b/0xc0 [ 1353.757857] free_transhuge_page+0x3af/0x460 [ 1353.762278] ? split_huge_page_to_list+0x3500/0x3500 [ 1353.767381] release_pages+0x70c/0x1650 [ 1353.771367] free_pages_and_swap_cache+0x54b/0x570 [ 1353.776303] unmap_page_range+0x37b8/0x4170 [ 1353.780665] ? save_stack_trace+0xa3/0xe0 [ 1353.784883] unmap_single_vma+0x445/0x5e0 [ 1353.789041] unmap_vmas+0x251/0x380 [ 1353.792713] exit_mmap+0x4b7/0x940 [ 1353.796290] ? uprobe_clear_state+0x1ac/0x270 [ 1353.800790] ? __mmput+0x3a/0x5f0 [ 1353.804294] __mmput+0x154/0x5f0 [ 1353.807690] mmput+0xa7/0xe0 [ 1353.810729] exit_mm+0x6dd/0x790 [ 1353.814125] do_exit+0xbf7/0x3890 [ 1353.817607] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1353.823016] do_group_exit+0x1a0/0x350 [ 1353.826915] __do_sys_exit_group+0x21/0x30 [ 1353.831166] __se_sys_exit_group+0x14/0x20 [ 1353.835416] __x64_sys_exit_group+0x1d/0x20 [ 1353.839739] do_syscall_64+0xb8/0x100 [ 1353.843547] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 1353.848736] RIP: 0033:0x47fc44 [ 1353.851936] Code: Bad RIP value. [ 1353.855309] RSP: 002b:000000c432de5b30 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1353.863028] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047fc44 [ 1353.870304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1353.877607] RBP: 000000c432de5b70 R08: 0000000000000000 R09: 0000000000000000 [ 1353.884935] R10: 0000000000000000 R11: 0000000000000246 R12: 000000c4673b6020 [ 1353.892244] R13: 00000000008aa0ce R14: 000000000000000a R15: 0000000000000001 [ 1353.899560] Modules linked in: [ 1353.903154] ---[ end trace a43ee746e7e89797 ]--- [ 1353.908089] RIP: 0010:kmsan_free_page+0x281/0x2d0 [ 1353.913119] Code: 7d d0 83 c0 ff 41 89 85 f4 08 00 00 75 59 e8 06 80 49 ff 4c 89 7d c0 ff 75 c0 9d 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 [ 1353.932129] RSP: 0018:ffff8801b67af300 EFLAGS: 00010286 [ 1353.937628] RAX: 0000000000000038 RBX: ffffea00069f1550 RCX: 0000000000000009 [ 1353.945046] RDX: ffff8801ff814498 RSI: 0000000000000009 RDI: ffffea00069f0000 [ 1353.952462] RBP: ffff8801b67af348 R08: 0000000000480020 R09: 0000000000000002 [ 1353.959847] R10: 0000000000000000 R11: ffffffff81c47240 R12: 0000000000000200 [ 1353.967244] R13: 0000000000000009 R14: 0000000000000009 R15: ffff8801c8912680 [ 1353.974624] FS: 000000c420027c68(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 1353.983009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1353.989028] CR2: 000000000047fc1a CR3: 0000000009c30000 CR4: 00000000001406f0 [ 1353.996443] Kernel panic - not syncing: Fatal exception [ 1354.002187] Kernel Offset: disabled [ 1354.005857] Rebooting in 86400 seconds..